CVE-2022-40139

Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution. Please note: an attacker must first obtain Apex One server administration console access in order to exploit this vulnerability.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:trendmicro:apex_one:-:*:*:*:*:saas:*:*
cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:20

Type Values Removed Values Added
References () https://success.trendmicro.com/solution/000291528 - Patch, Vendor Advisory () https://success.trendmicro.com/solution/000291528 - Patch, Vendor Advisory

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-20 NVD-CWE-noinfo

Information

Published : 2022-09-19 18:15

Updated : 2024-11-21 07:20


NVD link : CVE-2022-40139

Mitre link : CVE-2022-40139

CVE.ORG link : CVE-2022-40139


JSON object : View

Products Affected

trendmicro

  • apex_one

microsoft

  • windows