CVE-2022-48191

A vulnerability exists in Trend Micro Maximum Security 2022 (17.7) wherein a low-privileged user can write a known malicious executable to a specific location and in the process of removal and restoral an attacker could replace an original folder with a mount point to an arbitrary location, allowing a escalation of privileges on an affected system.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:trendmicro:maximum_security_2022:17.7:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:32

Type Values Removed Values Added
References () https://helpcenter.trendmicro.com/en-us/article/tmka-11252 - Patch, Vendor Advisory () https://helpcenter.trendmicro.com/en-us/article/tmka-11252 - Patch, Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-23-053/ - Patch, Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-23-053/ - Patch, Third Party Advisory, VDB Entry
Summary
  • (es) Existe una vulnerabilidad en Trend Micro Maximum Security 2022 (17.7) en la que un usuario con pocos privilegios puede escribir un ejecutable malicioso conocido en una ubicación específica y, en el proceso de eliminación y restauración, un atacante podría reemplazar una carpeta original con un punto de montaje arbitrario. ubicación, lo que permite una escalada de privilegios en un sistema afectado.

Information

Published : 2023-01-20 07:15

Updated : 2024-11-21 07:32


NVD link : CVE-2022-48191

Mitre link : CVE-2022-48191

CVE.ORG link : CVE-2022-48191


JSON object : View

Products Affected

microsoft

  • windows

trendmicro

  • maximum_security_2022
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition