CVE-2022-36336

A link following vulnerability in the scanning function of Trend Micro Apex One and Worry-Free Business Security agents could allow a local attacker to escalate privileges on affected installations. The resolution for this issue has been deployed automatically via ActiveUpdate to customers in an updated Spyware pattern. Customers who are up-to-date on detection patterns are not required to take any additional steps to mitigate this issue.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:trendmicro:apex_one:-:*:*:*:saas:*:*:*
cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:worry-free_business_security:10.0:sp1:*:*:*:*:*:*
cpe:2.3:a:trendmicro:worry-free_business_security_services:-:*:*:*:saas:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:12

Type Values Removed Values Added
References () https://success.trendmicro.com/solution/000291267 - Vendor Advisory () https://success.trendmicro.com/solution/000291267 - Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-22-1033/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-22-1033/ - Third Party Advisory, VDB Entry

Information

Published : 2022-07-30 00:15

Updated : 2024-11-21 07:12


NVD link : CVE-2022-36336

Mitre link : CVE-2022-36336

CVE.ORG link : CVE-2022-36336


JSON object : View

Products Affected

trendmicro

  • worry-free_business_security
  • apex_one
  • worry-free_business_security_services

microsoft

  • windows
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')