CVE-2022-34893

Trend Micro Security 2022 (consumer) has a link following vulnerability where an attacker with lower privileges could manipulate a mountpoint which could lead to escalation of privilege on an affected machine.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:trendmicro:security:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:10

Type Values Removed Values Added
References () https://helpcenter.trendmicro.com/en-us/article/tmka-11053 - Patch, Vendor Advisory () https://helpcenter.trendmicro.com/en-us/article/tmka-11053 - Patch, Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-22-1175/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-22-1175/ - Third Party Advisory, VDB Entry

Information

Published : 2022-09-19 18:15

Updated : 2024-11-21 07:10


NVD link : CVE-2022-34893

Mitre link : CVE-2022-34893

CVE.ORG link : CVE-2022-34893


JSON object : View

Products Affected

microsoft

  • windows

trendmicro

  • security
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')