CVE-2022-27883

A link following vulnerability in Trend Micro Antivirus for Mac 11.5 could allow an attacker to create a specially-crafted file as a symlink that can lead to privilege escalation. Please note that an attacker must at least have low-level privileges on the system to attempt to exploit this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:trendmicro:antivirus_for_mac:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:56

Type Values Removed Values Added
References () https://helpcenter.trendmicro.com/en-us/article/tmka-10978 - Vendor Advisory () https://helpcenter.trendmicro.com/en-us/article/tmka-10978 - Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-22-546/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-22-546/ - Third Party Advisory, VDB Entry

Information

Published : 2022-04-09 00:15

Updated : 2024-11-21 06:56


NVD link : CVE-2022-27883

Mitre link : CVE-2022-27883

CVE.ORG link : CVE-2022-27883


JSON object : View

Products Affected

trendmicro

  • antivirus_for_mac
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')