7.8
CVE-2022-36336
- EPSS 0.07%
- Veröffentlicht 30.07.2022 00:15:08
- Zuletzt bearbeitet 21.11.2024 07:12:48
- Quelle security@trendmicro.com
- Teams Watchlist Login
- Unerledigt Login
A link following vulnerability in the scanning function of Trend Micro Apex One and Worry-Free Business Security agents could allow a local attacker to escalate privileges on affected installations. The resolution for this issue has been deployed automatically via ActiveUpdate to customers in an updated Spyware pattern. Customers who are up-to-date on detection patterns are not required to take any additional steps to mitigate this issue.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Trendmicro ≫ Apex One Version- SwEditionsaas
Trendmicro ≫ Apex One Version2019
Trendmicro ≫ Worry-free Business Security Version10.0 Updatesp1
Trendmicro ≫ Worry-free Business Security Services Version- SwEditionsaas
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.221 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-59 Improper Link Resolution Before File Access ('Link Following')
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.