A vulnerability exists in Trend Micro Maximum Security 2022 (17.7) wherein a low-privileged user can write a known malicious executable to a specific location and in the process of removal and restoral an attacker could replace an original folder with a mount point to an arbitrary location, allowing a escalation of privileges on an affected system.
References
Link | Resource |
---|---|
https://helpcenter.trendmicro.com/en-us/article/tmka-11252 | Patch Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-23-053/ | Patch Third Party Advisory VDB Entry |
https://helpcenter.trendmicro.com/en-us/article/tmka-11252 | Patch Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-23-053/ | Patch Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://helpcenter.trendmicro.com/en-us/article/tmka-11252 - Patch, Vendor Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-23-053/ - Patch, Third Party Advisory, VDB Entry | |
Summary |
|
Information
Published : 2023-01-20 07:15
Updated : 2024-11-21 07:32
NVD link : CVE-2022-48191
Mitre link : CVE-2022-48191
CVE.ORG link : CVE-2022-48191
JSON object : View
Products Affected
microsoft
- windows
trendmicro
- maximum_security_2022
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition