CVE-2022-26319

An installer search patch element vulnerability in Trend Micro Portable Security 3.0 Pro, 3.0 and 2.0 could allow a local attacker to place an arbitrarily generated DLL file in an installer folder to elevate local privileges. Please note: an attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:trendmicro:portable_security:*:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:portable_security:*:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:portable_security:*:*:*:*:pro:*:*:*

History

21 Nov 2024, 06:53

Type Values Removed Values Added
References () https://success.trendmicro.com/solution/000290531 - Patch, Vendor Advisory () https://success.trendmicro.com/solution/000290531 - Patch, Vendor Advisory

Information

Published : 2022-03-08 22:15

Updated : 2024-11-21 06:53


NVD link : CVE-2022-26319

Mitre link : CVE-2022-26319

CVE.ORG link : CVE-2022-26319


JSON object : View

Products Affected

trendmicro

  • portable_security
CWE
CWE-427

Uncontrolled Search Path Element