All the vulnerabilites related to Trend Micro - Trend Micro Apex One
cve-2022-40144
Vulnerability from cvelistv5
Published
2022-09-19 00:00
Modified
2024-08-03 12:14
Severity ?
EPSS score ?
Summary
A vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service could allow an attacker to bypass the product's login authentication by falsifying request parameters on affected installations.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:14:39.823Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/solution/000291528" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN36454862/index.html" }, { "tags": [ "x_transferred" ], "url": "https://appweb.trendmicro.com/SupportNews/NewsDetail.aspx?id=4553" }, { "tags": [ "x_transferred" ], "url": "https://www.ipa.go.jp/security/ciadr/vul/20220913-jvn.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019 (on-prem) and SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service could allow an attacker to bypass the product\u0027s login authentication by falsifying request parameters on affected installations." } ], "problemTypes": [ { "descriptions": [ { "description": "Login Authentication Bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T00:00:00", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/solution/000291528" }, { "url": "https://jvn.jp/en/jp/JVN36454862/index.html" }, { "url": "https://appweb.trendmicro.com/SupportNews/NewsDetail.aspx?id=4553" }, { "url": "https://www.ipa.go.jp/security/ciadr/vul/20220913-jvn.html" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-40144", "datePublished": "2022-09-19T00:00:00", "dateReserved": "2022-09-06T00:00:00", "dateUpdated": "2024-08-03T12:14:39.823Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-28583
Vulnerability from cvelistv5
Published
2020-12-01 18:40
Modified
2024-08-04 16:40
Severity ?
EPSS score ?
Summary
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version, build and patch information.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000281949 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000281947 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1387/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One | |
Trend Micro | Trend Micro OfficeScan |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:40:59.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000281949" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000281947" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1387/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version, build and patch information." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-01T18:40:39", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000281949" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000281947" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1387/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-28583", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version, build and patch information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000281949", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000281949" }, { "name": "https://success.trendmicro.com/solution/000281947", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000281947" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1387/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1387/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-28583", "datePublished": "2020-12-01T18:40:39", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-08-04T16:40:59.251Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25235
Vulnerability from cvelistv5
Published
2021-02-04 19:36
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about a content inspection configuration file.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284202 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284205 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-110/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One | |
Trend Micro | Trend Micro OfficeScan |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.080Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-110/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about a content inspection configuration file." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T19:36:42", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-110/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25235", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about a content inspection configuration file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284202", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284202" }, { "name": "https://success.trendmicro.com/solution/000284205", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284205" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-110/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-110/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25235", "datePublished": "2021-02-04T19:36:43", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.080Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-30701
Vulnerability from cvelistv5
Published
2022-05-26 23:25
Modified
2024-08-03 06:56
Severity ?
EPSS score ?
Summary
An uncontrolled search path element vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to craft a special configuration file to load an untrusted library with escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000291008 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-797/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:56:13.781Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000291008" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-797/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019 and SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "An uncontrolled search path element vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to craft a special configuration file to load an untrusted library with escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Search Path Element", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-26T23:25:31", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000291008" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-797/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2022-30701", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019 and SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An uncontrolled search path element vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to craft a special configuration file to load an untrusted library with escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Search Path Element" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000291008", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000291008" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-797/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-797/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-30701", "datePublished": "2022-05-26T23:25:31", "dateReserved": "2022-05-13T00:00:00", "dateUpdated": "2024-08-03T06:56:13.781Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41749
Vulnerability from cvelistv5
Published
2022-10-10 00:00
Modified
2024-08-03 12:49
Severity ?
EPSS score ?
Summary
An origin validation error vulnerability in Trend Micro Apex One agents could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.934Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/solution/000291645" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1400/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019 (on-prem) and SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "An origin validation error vulnerability in Trend Micro Apex One agents could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Origin Validation Error", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-10T00:00:00", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/solution/000291645" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1400/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-41749", "datePublished": "2022-10-10T00:00:00", "dateReserved": "2022-09-28T00:00:00", "dateUpdated": "2024-08-03T12:49:43.934Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24679
Vulnerability from cvelistv5
Published
2022-02-24 02:45
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
A security link following local privilege escalation vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow a local attacker to create an writable folder in an arbitrary location and escalate privileges affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000290464 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000290486 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-370/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:50.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000290464" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000290486" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-370/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1, Services (SaaS)" } ] } ], "descriptions": [ { "lang": "en", "value": "A security link following local privilege escalation vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow a local attacker to create an writable folder in an arbitrary location and escalate privileges affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Link Following Local Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-24T02:45:51", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000290464" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000290486" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-370/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2022-24679", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1, Services (SaaS)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A security link following local privilege escalation vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow a local attacker to create an writable folder in an arbitrary location and escalate privileges affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Link Following Local Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000290464", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000290464" }, { "name": "https://success.trendmicro.com/solution/000290486", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000290486" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-370/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-370/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-24679", "datePublished": "2022-02-24T02:45:51", "dateReserved": "2022-02-09T00:00:00", "dateUpdated": "2024-08-03T04:20:50.339Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45441
Vulnerability from cvelistv5
Published
2022-01-08 15:51
Modified
2024-08-04 04:39
Severity ?
EPSS score ?
Summary
A origin validation error vulnerability in Trend Micro Apex One (on-prem and SaaS) could allow a local attacker drop and manipulate a specially crafted file to issue commands over a certain pipe and elevate to a higher level of privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289996 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-017/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:39:20.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289996" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-017/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "A origin validation error vulnerability in Trend Micro Apex One (on-prem and SaaS) could allow a local attacker drop and manipulate a specially crafted file to issue commands over a certain pipe and elevate to a higher level of privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Origin Validation Error Local Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-08T15:51:07", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289996" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-017/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-45441", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A origin validation error vulnerability in Trend Micro Apex One (on-prem and SaaS) could allow a local attacker drop and manipulate a specially crafted file to issue commands over a certain pipe and elevate to a higher level of privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Origin Validation Error Local Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000289996", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289996" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-017/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-017/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-45441", "datePublished": "2022-01-08T15:51:07", "dateReserved": "2021-12-20T00:00:00", "dateUpdated": "2024-08-04T04:39:20.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25242
Vulnerability from cvelistv5
Published
2021-02-04 19:36
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain version and build information.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284202 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284205 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284206 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-115/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.063Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-115/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain version and build information." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T19:36:47", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-115/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25242", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain version and build information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284202", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284202" }, { "name": "https://success.trendmicro.com/solution/000284205", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284205" }, { "name": "https://success.trendmicro.com/solution/000284206", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284206" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-115/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-115/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25242", "datePublished": "2021-02-04T19:36:47", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.063Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25249
Vulnerability from cvelistv5
Published
2021-02-04 19:36
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An out-of-bounds write information disclosure vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284202 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284205 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284206 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-119/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.053Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-119/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1, Services (SaaS)" } ] } ], "descriptions": [ { "lang": "en", "value": "An out-of-bounds write information disclosure vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-Bounds Write Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T19:36:52", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-119/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25249", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1, Services (SaaS)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An out-of-bounds write information disclosure vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-Bounds Write Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284202", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284202" }, { "name": "https://success.trendmicro.com/solution/000284205", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284205" }, { "name": "https://success.trendmicro.com/solution/000284206", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284206" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-119/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-119/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25249", "datePublished": "2021-02-04T19:36:52", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.053Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-40139
Vulnerability from cvelistv5
Published
2022-09-19 18:01
Modified
2024-08-03 12:14
Severity ?
EPSS score ?
Summary
Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution. Please note: an attacker must first obtain Apex One server administration console access in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000291528 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:14:39.635Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000291528" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019 (on-prem) and SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution. Please note: an attacker must first obtain Apex One server administration console access in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-19T18:01:01", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000291528" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2022-40139", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019 (on-prem) and SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution. Please note: an attacker must first obtain Apex One server administration console access in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000291528", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000291528" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-40139", "datePublished": "2022-09-19T18:01:01", "dateReserved": "2022-09-06T00:00:00", "dateUpdated": "2024-08-03T12:14:39.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24556
Vulnerability from cvelistv5
Published
2020-09-01 18:55
Modified
2024-08-04 15:12
Severity ?
EPSS score ?
Summary
A vulnerability in Trend Micro Apex One, OfficeScan XG SP1, Worry-Free Business Security 10 SP1 and Worry-Free Business Security Services on Microsoft Windows may allow an attacker to create a hard link to any file on the system, which then could be manipulated to gain a privilege escalation and code execution. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000263632 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000263633 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1093/ | x_refsource_MISC | |
https://success.trendmicro.com/solution/000267260 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:12:09.086Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000263632" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000263633" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1093/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000267260" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2009 (on premise), SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10 SP1, Services (SaaS)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Trend Micro Apex One, OfficeScan XG SP1, Worry-Free Business Security 10 SP1 and Worry-Free Business Security Services on Microsoft Windows may allow an attacker to create a hard link to any file on the system, which then could be manipulated to gain a privilege escalation and code execution. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T21:21:21", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000263632" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000263633" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1093/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000267260" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-24556", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2009 (on premise), SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10 SP1, Services (SaaS)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Trend Micro Apex One, OfficeScan XG SP1, Worry-Free Business Security 10 SP1 and Worry-Free Business Security Services on Microsoft Windows may allow an attacker to create a hard link to any file on the system, which then could be manipulated to gain a privilege escalation and code execution. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000263632", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000263632" }, { "name": "https://success.trendmicro.com/solution/000263633", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000263633" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1093/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1093/" }, { "name": "https://success.trendmicro.com/solution/000267260", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000267260" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-24556", "datePublished": "2020-09-01T18:55:26", "dateReserved": "2020-08-20T00:00:00", "dateUpdated": "2024-08-04T15:12:09.086Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25243
Vulnerability from cvelistv5
Published
2021-02-04 19:36
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain patch level information.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284202 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284205 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284206 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-116/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.085Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-116/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain patch level information." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T19:36:48", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-116/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25243", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain patch level information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284202", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284202" }, { "name": "https://success.trendmicro.com/solution/000284205", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284205" }, { "name": "https://success.trendmicro.com/solution/000284206", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284206" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-116/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-116/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25243", "datePublished": "2021-02-04T19:36:48", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.085Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42011
Vulnerability from cvelistv5
Published
2021-10-21 07:46
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to load a DLL with escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289229 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1220/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.709Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1220/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to load a DLL with escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Permission Assignment Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-21T07:46:03", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1220/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-42011", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to load a DLL with escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Permission Assignment Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000289229", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289229" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1220/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1220/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-42011", "datePublished": "2021-10-21T07:46:03", "dateReserved": "2021-10-05T00:00:00", "dateUpdated": "2024-08-04T03:22:25.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-30700
Vulnerability from cvelistv5
Published
2022-05-26 23:25
Modified
2024-08-03 06:56
Severity ?
EPSS score ?
Summary
An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to load a DLL with escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000291008 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-790/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:56:13.806Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000291008" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-790/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019 and SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to load a DLL with escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Permission Assignment LPE", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-26T23:25:30", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000291008" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-790/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2022-30700", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019 and SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to load a DLL with escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Permission Assignment LPE" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000291008", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000291008" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-790/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-790/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-30700", "datePublished": "2022-05-26T23:25:30", "dateReserved": "2022-05-13T00:00:00", "dateUpdated": "2024-08-03T06:56:13.806Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-28577
Vulnerability from cvelistv5
Published
2020-12-01 18:40
Modified
2024-08-04 16:40
Severity ?
EPSS score ?
Summary
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal server hostname and db names.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000281949 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000281947 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1376/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One | |
Trend Micro | Trend Micro OfficeScan |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:40:59.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000281949" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000281947" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1376/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal server hostname and db names." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-01T18:40:38", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000281949" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000281947" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1376/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-28577", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal server hostname and db names." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000281949", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000281949" }, { "name": "https://success.trendmicro.com/solution/000281947", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000281947" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1376/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1376/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-28577", "datePublished": "2020-12-01T18:40:38", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-08-04T16:40:59.382Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25239
Vulnerability from cvelistv5
Published
2021-02-04 19:36
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An improper access control vulnerability in Trend Micro Apex One (on-prem), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about x86 agent hotfixes.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284202 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284205 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284206 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-112/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-112/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about x86 agent hotfixes." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T19:36:45", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-112/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25239", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about x86 agent hotfixes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284202", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284202" }, { "name": "https://success.trendmicro.com/solution/000284205", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284205" }, { "name": "https://success.trendmicro.com/solution/000284206", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284206" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-112/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-112/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25239", "datePublished": "2021-02-04T19:36:45", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41747
Vulnerability from cvelistv5
Published
2022-10-10 00:00
Modified
2024-08-03 12:49
Severity ?
EPSS score ?
Summary
An improper certification validation vulnerability in Trend Micro Apex One agents could allow a local attacker to load a DLL file with system service privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/solution/000291645" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1402/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019 (on-prem) and SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper certification validation vulnerability in Trend Micro Apex One agents could allow a local attacker to load a DLL file with system service privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Certification Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-10T00:00:00", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/solution/000291645" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1402/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-41747", "datePublished": "2022-10-10T00:00:00", "dateReserved": "2022-09-28T00:00:00", "dateUpdated": "2024-08-03T12:49:43.590Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42106
Vulnerability from cvelistv5
Published
2021-10-21 07:46
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42105 and 42107.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289229 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000289230 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1218/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.939Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289230" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1218/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1, Services (SaaS)" } ] } ], "descriptions": [ { "lang": "en", "value": "Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42105 and 42107." } ], "problemTypes": [ { "descriptions": [ { "description": "Unnecessary Privileges Local Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-21T07:46:09", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289230" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1218/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-42106", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1, Services (SaaS)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42105 and 42107." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unnecessary Privileges Local Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000289229", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289229" }, { "name": "https://success.trendmicro.com/solution/000289230", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289230" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1218/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1218/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-42106", "datePublished": "2021-10-21T07:46:09", "dateReserved": "2021-10-08T00:00:00", "dateUpdated": "2024-08-04T03:22:25.939Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24680
Vulnerability from cvelistv5
Published
2022-02-24 02:45
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
A security link following local privilege escalation vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow a local attacker to create a mount point and leverage this for arbitrary folder deletion, leading to escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000290464 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000290486 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-369/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:49.145Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000290464" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000290486" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-369/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1, Services (SaaS)" } ] } ], "descriptions": [ { "lang": "en", "value": "A security link following local privilege escalation vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow a local attacker to create a mount point and leverage this for arbitrary folder deletion, leading to escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Link Following Local Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-24T02:45:52", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000290464" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000290486" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-369/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2022-24680", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1, Services (SaaS)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A security link following local privilege escalation vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow a local attacker to create a mount point and leverage this for arbitrary folder deletion, leading to escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Link Following Local Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000290464", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000290464" }, { "name": "https://success.trendmicro.com/solution/000290486", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000290486" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-369/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-369/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-24680", "datePublished": "2022-02-24T02:45:52", "dateReserved": "2022-02-09T00:00:00", "dateUpdated": "2024-08-03T04:20:49.145Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25234
Vulnerability from cvelistv5
Published
2021-02-04 19:36
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about a specific notification configuration file.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284202 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284205 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284206 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-109/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.062Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-109/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about a specific notification configuration file." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T19:36:42", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-109/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25234", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about a specific notification configuration file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284202", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284202" }, { "name": "https://success.trendmicro.com/solution/000284205", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284205" }, { "name": "https://success.trendmicro.com/solution/000284206", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284206" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-109/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-109/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25234", "datePublished": "2021-02-04T19:36:42", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.062Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32465
Vulnerability from cvelistv5
Published
2021-08-04 18:29
Modified
2024-08-03 23:17
Severity ?
EPSS score ?
Summary
An incorrect permission preservation vulnerability in Trend Micro Apex One, Apex One as a Service and OfficeScan XG SP1 could allow a remote user to perform an attack and bypass authentication on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000287819 | x_refsource_MISC | |
https://success.trendmicro.com/jp/solution/000287796 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-911/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One | |
Trend Micro | Trend Micro OfficeScan |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:17:29.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000287819" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/jp/solution/000287796" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-911/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An incorrect permission preservation vulnerability in Trend Micro Apex One, Apex One as a Service and OfficeScan XG SP1 could allow a remote user to perform an attack and bypass authentication on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Permission Preservation Authentication Bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-04T18:29:37", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000287819" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/jp/solution/000287796" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-911/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-32465", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An incorrect permission preservation vulnerability in Trend Micro Apex One, Apex One as a Service and OfficeScan XG SP1 could allow a remote user to perform an attack and bypass authentication on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Permission Preservation Authentication Bypass" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000287819", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000287819" }, { "name": "https://success.trendmicro.com/jp/solution/000287796", "refsource": "MISC", "url": "https://success.trendmicro.com/jp/solution/000287796" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-911/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-911/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-32465", "datePublished": "2021-08-04T18:29:37", "dateReserved": "2021-05-07T00:00:00", "dateUpdated": "2024-08-03T23:17:29.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24563
Vulnerability from cvelistv5
Published
2020-09-28 23:30
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
A vulnerability in Trend Micro Apex One may allow a local attacker to manipulate the process of the security agent unload option (if configured), which then could be manipulated to gain a privilege escalation and code execution. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000271974 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1218/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:19:07.401Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000271974" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1218/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2009, SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Trend Micro Apex One may allow a local attacker to manipulate the process of the security agent unload option (if configured), which then could be manipulated to gain a privilege escalation and code execution. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication Bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-28T23:30:42", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000271974" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1218/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-24563", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2009, SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Trend Micro Apex One may allow a local attacker to manipulate the process of the security agent unload option (if configured), which then could be manipulated to gain a privilege escalation and code execution. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authentication Bypass" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000271974", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000271974" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1218/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1218/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-24563", "datePublished": "2020-09-28T23:30:42", "dateReserved": "2020-08-20T00:00:00", "dateUpdated": "2024-08-04T15:19:07.401Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24565
Vulnerability from cvelistv5
Published
2020-09-28 23:30
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs affected in this vulnerability makes it unique compared to similar CVEs such as CVE-2020-24564 and CVE-2020-25770.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000271974 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1220/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:19:07.757Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000271974" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1220/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2009, SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs affected in this vulnerability makes it unique compared to similar CVEs such as CVE-2020-24564 and CVE-2020-25770." } ], "problemTypes": [ { "descriptions": [ { "description": "OOB Read Info Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-28T23:30:42", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000271974" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1220/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-24565", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2009, SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs affected in this vulnerability makes it unique compared to similar CVEs such as CVE-2020-24564 and CVE-2020-25770." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "OOB Read Info Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000271974", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000271974" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1220/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1220/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-24565", "datePublished": "2020-09-28T23:30:42", "dateReserved": "2020-08-20T00:00:00", "dateUpdated": "2024-08-04T15:19:07.757Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25773
Vulnerability from cvelistv5
Published
2020-09-28 23:30
Modified
2024-08-04 15:40
Severity ?
EPSS score ?
Summary
A vulnerability in the Trend Micro Apex One ServerMigrationTool component could allow an attacker to execute arbitrary code on affected products. User interaction is required to exploit this vulnerability in that the target must import a corrupted configuration file.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000271974 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1224/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.970Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000271974" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1224/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2009, SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Trend Micro Apex One ServerMigrationTool component could allow an attacker to execute arbitrary code on affected products. User interaction is required to exploit this vulnerability in that the target must import a corrupted configuration file." } ], "problemTypes": [ { "descriptions": [ { "description": "Double Free RCE", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-28T23:30:44", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000271974" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1224/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-25773", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2009, SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Trend Micro Apex One ServerMigrationTool component could allow an attacker to execute arbitrary code on affected products. User interaction is required to exploit this vulnerability in that the target must import a corrupted configuration file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Double Free RCE" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000271974", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000271974" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1224/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1224/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-25773", "datePublished": "2020-09-28T23:30:44", "dateReserved": "2020-09-18T00:00:00", "dateUpdated": "2024-08-04T15:40:36.970Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-28576
Vulnerability from cvelistv5
Published
2020-12-01 18:40
Modified
2024-08-04 16:40
Severity ?
EPSS score ?
Summary
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version and build information.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000281949 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000281947 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1375/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One | |
Trend Micro | Trend Micro OfficeScan |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:40:59.867Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000281949" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000281947" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1375/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version and build information." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-01T18:40:38", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000281949" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000281947" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1375/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-28576", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version and build information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000281949", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000281949" }, { "name": "https://success.trendmicro.com/solution/000281947", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000281947" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1375/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1375/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-28576", "datePublished": "2020-12-01T18:40:38", "dateReserved": "2020-11-12T00:00:00", "dateUpdated": "2024-08-04T16:40:59.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32463
Vulnerability from cvelistv5
Published
2021-07-20 11:09
Modified
2024-08-03 23:17
Severity ?
EPSS score ?
Summary
An incorrect permission assignment denial-of-service vulnerability in Trend Micro Apex One, Apex One as a Service (SaaS), Worry-Free Business Security 10.0 SP1 and Worry-Free Servgices could allow a local attacker to escalate privileges and delete files with system privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000286855 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000286856 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-786/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:17:29.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000286855" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000286856" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-786/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1, Services (SaaS)" } ] } ], "descriptions": [ { "lang": "en", "value": "An incorrect permission assignment denial-of-service vulnerability in Trend Micro Apex One, Apex One as a Service (SaaS), Worry-Free Business Security 10.0 SP1 and Worry-Free Servgices could allow a local attacker to escalate privileges and delete files with system privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Permission Assignment Denial-of-Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-20T11:09:57", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000286855" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000286856" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-786/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-32463", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1, Services (SaaS)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An incorrect permission assignment denial-of-service vulnerability in Trend Micro Apex One, Apex One as a Service (SaaS), Worry-Free Business Security 10.0 SP1 and Worry-Free Servgices could allow a local attacker to escalate privileges and delete files with system privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Permission Assignment Denial-of-Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000286855", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000286855" }, { "name": "https://success.trendmicro.com/solution/000286856", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000286856" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-786/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-786/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-32463", "datePublished": "2021-07-20T11:09:57", "dateReserved": "2021-05-07T00:00:00", "dateUpdated": "2024-08-03T23:17:29.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25770
Vulnerability from cvelistv5
Published
2020-09-28 23:30
Modified
2024-08-04 15:40
Severity ?
EPSS score ?
Summary
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs affected in this vulnerability makes it unique compared to similar CVEs such as CVE-2020-24564 and CVE-2020-25771.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000271974 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1221/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.949Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000271974" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1221/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2009, SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs affected in this vulnerability makes it unique compared to similar CVEs such as CVE-2020-24564 and CVE-2020-25771." } ], "problemTypes": [ { "descriptions": [ { "description": "OOB Read Info Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-28T23:30:43", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000271974" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1221/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-25770", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2009, SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs affected in this vulnerability makes it unique compared to similar CVEs such as CVE-2020-24564 and CVE-2020-25771." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "OOB Read Info Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000271974", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000271974" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1221/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1221/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-25770", "datePublished": "2020-09-28T23:30:43", "dateReserved": "2020-09-18T00:00:00", "dateUpdated": "2024-08-04T15:40:36.949Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42102
Vulnerability from cvelistv5
Published
2021-10-21 07:46
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service agents could allow a local attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289229 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1222/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.977Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1222/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service agents could allow a local attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Search Path Element Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-21T07:46:05", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1222/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-42102", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service agents could allow a local attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Search Path Element Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000289229", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289229" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1222/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1222/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-42102", "datePublished": "2021-10-21T07:46:05", "dateReserved": "2021-10-08T00:00:00", "dateUpdated": "2024-08-04T03:22:25.977Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24558
Vulnerability from cvelistv5
Published
2020-09-01 18:55
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
A vulnerability in an Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services dll may allow an attacker to manipulate it to cause an out-of-bounds read that crashes multiple processes in the product. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000263632 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1095/ | x_refsource_MISC | |
https://success.trendmicro.com/solution/000267260 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:19:07.400Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000263632" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1095/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000267260" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2009 (on premise), SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1, Services (SaaS)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in an Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services dll may allow an attacker to manipulate it to cause an out-of-bounds read that crashes multiple processes in the product. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T21:21:21", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000263632" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1095/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000267260" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-24558", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2009 (on premise), SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1, Services (SaaS)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in an Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services dll may allow an attacker to manipulate it to cause an out-of-bounds read that crashes multiple processes in the product. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000263632", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000263632" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1095/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1095/" }, { "name": "https://success.trendmicro.com/solution/000267260", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000267260" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-24558", "datePublished": "2020-09-01T18:55:27", "dateReserved": "2020-08-20T00:00:00", "dateUpdated": "2024-08-04T15:19:07.400Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42107
Vulnerability from cvelistv5
Published
2021-10-21 07:46
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42105 and 42106.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289229 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000289230 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1214/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.899Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289230" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1214/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1, Services (SaaS)" } ] } ], "descriptions": [ { "lang": "en", "value": "Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42105 and 42106." } ], "problemTypes": [ { "descriptions": [ { "description": "Unnecessary Privileges Local Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-21T07:46:10", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289230" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1214/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-42107", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1, Services (SaaS)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42105 and 42106." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unnecessary Privileges Local Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000289229", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289229" }, { "name": "https://success.trendmicro.com/solution/000289230", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289230" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1214/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1214/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-42107", "datePublished": "2021-10-21T07:46:10", "dateReserved": "2021-10-08T00:00:00", "dateUpdated": "2024-08-04T03:22:25.899Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25237
Vulnerability from cvelistv5
Published
2021-02-04 19:36
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An improper access control vulnerability in Trend Micro Apex One (on-prem) could allow an unauthenticated user to obtain information about the managing port used by agents.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284202 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-111/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.041Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-111/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem) could allow an unauthenticated user to obtain information about the managing port used by agents." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T19:36:44", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-111/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25237", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem) could allow an unauthenticated user to obtain information about the managing port used by agents." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284202", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284202" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-111/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-111/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25237", "datePublished": "2021-02-04T19:36:44", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.041Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25230
Vulnerability from cvelistv5
Published
2021-02-04 19:36
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about the contents of a scan connection exception file.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284202 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284205 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-105/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One | |
Trend Micro | Trend Micro OfficeScan |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.074Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-105/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about the contents of a scan connection exception file." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T19:36:39", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-105/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25230", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about the contents of a scan connection exception file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284202", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284202" }, { "name": "https://success.trendmicro.com/solution/000284205", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284205" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-105/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-105/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25230", "datePublished": "2021-02-04T19:36:39", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.074Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25228
Vulnerability from cvelistv5
Published
2021-02-04 19:36
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about hotfix history.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284202 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284205 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284206 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-103/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.064Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-103/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about hotfix history." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T19:36:38", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-103/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25228", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about hotfix history." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284202", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284202" }, { "name": "https://success.trendmicro.com/solution/000284205", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284205" }, { "name": "https://success.trendmicro.com/solution/000284206", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284206" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-103/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-103/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25228", "datePublished": "2021-02-04T19:36:38", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.064Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25231
Vulnerability from cvelistv5
Published
2021-02-04 19:36
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about a specific hotfix history file.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284202 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284205 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284206 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-106/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-106/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about a specific hotfix history file." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T19:36:40", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-106/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25231", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about a specific hotfix history file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284202", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284202" }, { "name": "https://success.trendmicro.com/solution/000284205", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284205" }, { "name": "https://success.trendmicro.com/solution/000284206", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284206" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-106/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-106/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25231", "datePublished": "2021-02-04T19:36:40", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-40141
Vulnerability from cvelistv5
Published
2022-09-19 18:01
Modified
2024-08-03 12:14
Severity ?
EPSS score ?
Summary
A vulnerability in Trend Micro Apex One and Apex One as a Service could allow an attacker to intercept and decode certain communication strings that may contain some identification attributes of a particular Apex One server.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000291528 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:14:39.954Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000291528" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019 (on-prem) and SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Trend Micro Apex One and Apex One as a Service could allow an attacker to intercept and decode certain communication strings that may contain some identification attributes of a particular Apex One server." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-19T18:01:03", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000291528" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2022-40141", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019 (on-prem) and SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Trend Micro Apex One and Apex One as a Service could allow an attacker to intercept and decode certain communication strings that may contain some identification attributes of a particular Apex One server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000291528", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000291528" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-40141", "datePublished": "2022-09-19T18:01:03", "dateReserved": "2022-09-06T00:00:00", "dateUpdated": "2024-08-03T12:14:39.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25253
Vulnerability from cvelistv5
Published
2021-04-13 12:53
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An improper access control vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service and OfficeScan XG SP1 on a resource used by the service could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000286019 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000286157 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-401/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One | |
Trend Micro | Trend Micro OfficeScan |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.086Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000286019" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000286157" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-401/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One\r\n", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service and OfficeScan XG SP1 on a resource used by the service could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-13T12:53:59", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000286019" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000286157" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-401/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25253", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One\r\n", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service and OfficeScan XG SP1 on a resource used by the service could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000286019", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000286019" }, { "name": "https://success.trendmicro.com/solution/000286157", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000286157" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-401/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-401/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25253", "datePublished": "2021-04-13T12:53:59", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.086Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42105
Vulnerability from cvelistv5
Published
2021-10-21 07:46
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42106 and 42107.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289229 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000289230 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1215/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.842Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289230" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1215/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1, Services (SaaS)" } ] } ], "descriptions": [ { "lang": "en", "value": "Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42106 and 42107." } ], "problemTypes": [ { "descriptions": [ { "description": "Unnecessary Privileges Local Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-21T07:46:08", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289230" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1215/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-42105", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1, Services (SaaS)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42106 and 42107." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unnecessary Privileges Local Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000289229", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289229" }, { "name": "https://success.trendmicro.com/solution/000289230", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289230" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1215/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1215/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-42105", "datePublished": "2021-10-21T07:46:08", "dateReserved": "2021-10-08T00:00:00", "dateUpdated": "2024-08-04T03:22:25.842Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45440
Vulnerability from cvelistv5
Published
2022-01-08 15:51
Modified
2024-08-04 04:39
Severity ?
EPSS score ?
Summary
A unnecessary privilege vulnerability in Trend Micro Apex One and Trend Micro Worry-Free Business Security 10.0 SP1 (on-prem versions only) could allow a local attacker to abuse an impersonation privilege and elevate to a higher level of privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289996 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-016/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:39:20.966Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289996" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-016/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "A unnecessary privilege vulnerability in Trend Micro Apex One and Trend Micro Worry-Free Business Security 10.0 SP1 (on-prem versions only) could allow a local attacker to abuse an impersonation privilege and elevate to a higher level of privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Unnecessary Privileges Local Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-08T15:51:06", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289996" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-016/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-45440", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A unnecessary privilege vulnerability in Trend Micro Apex One and Trend Micro Worry-Free Business Security 10.0 SP1 (on-prem versions only) could allow a local attacker to abuse an impersonation privilege and elevate to a higher level of privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unnecessary Privileges Local Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000289996", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289996" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-016/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-016/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-45440", "datePublished": "2022-01-08T15:51:06", "dateReserved": "2021-12-20T00:00:00", "dateUpdated": "2024-08-04T04:39:20.966Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-23139
Vulnerability from cvelistv5
Published
2021-10-21 07:46
Modified
2024-08-03 18:58
Severity ?
EPSS score ?
Summary
A null pointer vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 could allow an attacker to crash the CGI program on affected installations.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289229 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000289230 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:58:26.372Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289230" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "A null pointer vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 could allow an attacker to crash the CGI program on affected installations." } ], "problemTypes": [ { "descriptions": [ { "description": "Null Pointer", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-21T07:46:02", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289230" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-23139", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A null pointer vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 could allow an attacker to crash the CGI program on affected installations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null Pointer" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000289229", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289229" }, { "name": "https://success.trendmicro.com/solution/000289230", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289230" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-23139", "datePublished": "2021-10-21T07:46:02", "dateReserved": "2021-10-01T00:00:00", "dateUpdated": "2024-08-03T18:58:26.372Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-28572
Vulnerability from cvelistv5
Published
2020-11-18 18:45
Modified
2024-08-04 16:40
Severity ?
EPSS score ?
Summary
A vulnerability in Trend Micro Apex One could allow an unprivileged user to abuse the product installer to reinstall the agent with additional malicious code in the context of a higher privilege.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000281949 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:40:59.599Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000281949" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "On Premise (2019)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Trend Micro Apex One could allow an unprivileged user to abuse the product installer to reinstall the agent with additional malicious code in the context of a higher privilege." } ], "problemTypes": [ { "descriptions": [ { "description": "Local Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-18T18:45:38", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000281949" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-28572", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "On Premise (2019)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Trend Micro Apex One could allow an unprivileged user to abuse the product installer to reinstall the agent with additional malicious code in the context of a higher privilege." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Local Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000281949", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000281949" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-28572", "datePublished": "2020-11-18T18:45:38", "dateReserved": "2020-11-12T00:00:00", "dateUpdated": "2024-08-04T16:40:59.599Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8607
Vulnerability from cvelistv5
Published
2020-08-05 14:05
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000260713 | x_refsource_MISC | |
https://success.trendmicro.com/jp/solution/000260748 | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU99160193/ | x_refsource_MISC | |
https://jvn.jp/en/vu/JVNVU99160193/index.html | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:46.363Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000260713" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/jp/solution/000260748" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU99160193/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/vu/JVNVU99160193/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019 (On premise), SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] }, { "product": "Trend Micro Deep Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "12.x, 11.x. 10.x" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1, Services (SaaS)" } ] }, { "product": "Trend Micro Security (Consumer Family)", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2020 (v16), 2019 (v15)" } ] }, { "product": "Trend Micro Safe Lock", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2.0 SP1, TXOne Ed" } ] }, { "product": "Trend Micro ServerProtect", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "SPFS 6.0, SPNAF 5.8, SPEMC 5.8, SPNT 5.8" } ] }, { "product": "Trend Micro Portable Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "3.x, 2.x" } ] }, { "product": "Trend Micro HouseCall", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "8.0" } ] }, { "product": "Trend Micro Anti-Threat Toolkit (ATTK)", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "1.62.1240 and below" } ] }, { "product": "Trend Micro Rootkit Buster", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-05T14:05:22", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000260713" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/jp/solution/000260748" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU99160193/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/vu/JVNVU99160193/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-8607", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019 (On premise), SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } }, { "product_name": "Trend Micro Deep Security", "version": { "version_data": [ { "version_value": "12.x, 11.x. 10.x" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1, Services (SaaS)" } ] } }, { "product_name": "Trend Micro Security (Consumer Family)", "version": { "version_data": [ { "version_value": "2020 (v16), 2019 (v15)" } ] } }, { "product_name": "Trend Micro Safe Lock", "version": { "version_data": [ { "version_value": "2.0 SP1, TXOne Ed" } ] } }, { "product_name": "Trend Micro ServerProtect", "version": { "version_data": [ { "version_value": "SPFS 6.0, SPNAF 5.8, SPEMC 5.8, SPNT 5.8" } ] } }, { "product_name": "Trend Micro Portable Security", "version": { "version_data": [ { "version_value": "3.x, 2.x" } ] } }, { "product_name": "Trend Micro HouseCall", "version": { "version_data": [ { "version_value": "8.0" } ] } }, { "product_name": "Trend Micro Anti-Threat Toolkit (ATTK)", "version": { "version_data": [ { "version_value": "1.62.1240 and below" } ] } }, { "product_name": "Trend Micro Rootkit Buster", "version": { "version_data": [ { "version_value": "2.2" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000260713", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000260713" }, { "name": "https://success.trendmicro.com/jp/solution/000260748", "refsource": "MISC", "url": "https://success.trendmicro.com/jp/solution/000260748" }, { "name": "https://jvn.jp/vu/JVNVU99160193/", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU99160193/" }, { "name": "https://jvn.jp/en/vu/JVNVU99160193/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/vu/JVNVU99160193/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-8607", "datePublished": "2020-08-05T14:05:23", "dateReserved": "2020-02-04T00:00:00", "dateUpdated": "2024-08-04T10:03:46.363Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44022
Vulnerability from cvelistv5
Published
2021-12-03 10:50
Modified
2024-08-04 04:10
Severity ?
EPSS score ?
Summary
A reachable assertion vulnerability in Trend Micro Apex One could allow an attacker to crash the program on affected installations, leading to a denial-of-service (DoS). Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289229 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:10:17.161Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289229" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019" } ] } ], "descriptions": [ { "lang": "en", "value": "A reachable assertion vulnerability in Trend Micro Apex One could allow an attacker to crash the program on affected installations, leading to a denial-of-service (DoS). Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Reachable Assertion Denial-of-Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-03T10:50:12", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289229" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-44022", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A reachable assertion vulnerability in Trend Micro Apex One could allow an attacker to crash the program on affected installations, leading to a denial-of-service (DoS). Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Reachable Assertion Denial-of-Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000289229", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289229" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-44022", "datePublished": "2021-12-03T10:50:12", "dateReserved": "2021-11-18T00:00:00", "dateUpdated": "2024-08-04T04:10:17.161Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25250
Vulnerability from cvelistv5
Published
2021-04-13 12:35
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An improper access control vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service and OfficeScan XG SP1 on a sensitive file could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000286019 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000286157 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-400/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One | |
Trend Micro | Trend Micro OfficeScan |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000286019" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000286157" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-400/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One\r\n", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service and OfficeScan XG SP1 on a sensitive file could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-13T12:35:04", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000286019" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000286157" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-400/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25250", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One\r\n", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service and OfficeScan XG SP1 on a sensitive file could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000286019", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000286019" }, { "name": "https://success.trendmicro.com/solution/000286157", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000286157" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-400/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-400/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25250", "datePublished": "2021-04-13T12:35:04", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45231
Vulnerability from cvelistv5
Published
2022-01-08 15:51
Modified
2024-08-04 04:39
Severity ?
EPSS score ?
Summary
A link following privilege escalation vulnerability in Trend Micro Apex One (on-prem and SaaS) and Trend Micro Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to create a specially crafted file with arbitrary content which could grant local privilege escalation on the affected system. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289996 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-013/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:39:20.384Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289996" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-013/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1, Services (SaaS)" } ] } ], "descriptions": [ { "lang": "en", "value": "A link following privilege escalation vulnerability in Trend Micro Apex One (on-prem and SaaS) and Trend Micro Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to create a specially crafted file with arbitrary content which could grant local privilege escalation on the affected system. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Link Following Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-08T15:51:05", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289996" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-013/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-45231", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1, Services (SaaS)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A link following privilege escalation vulnerability in Trend Micro Apex One (on-prem and SaaS) and Trend Micro Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to create a specially crafted file with arbitrary content which could grant local privilege escalation on the affected system. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Link Following Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000289996", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289996" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-013/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-013/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-45231", "datePublished": "2022-01-08T15:51:05", "dateReserved": "2021-12-17T00:00:00", "dateUpdated": "2024-08-04T04:39:20.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-28646
Vulnerability from cvelistv5
Published
2021-04-13 12:54
Modified
2024-08-03 21:47
Severity ?
EPSS score ?
Summary
An insecure file permissions vulnerability in Trend Micro Apex One, Apex One as a Service and OfficeScan XG SP1 could allow a local attacker to take control of a specific log file on affected installations.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000286019 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000286157 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One | |
Trend Micro | Trend Micro OfficeScan |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:47:33.035Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000286019" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000286157" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One\r\n", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An insecure file permissions vulnerability in Trend Micro Apex One, Apex One as a Service and OfficeScan XG SP1 could allow a local attacker to take control of a specific log file on affected installations." } ], "problemTypes": [ { "descriptions": [ { "description": "Insecure File Permissions", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-13T12:54:59", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000286019" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000286157" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-28646", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One\r\n", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An insecure file permissions vulnerability in Trend Micro Apex One, Apex One as a Service and OfficeScan XG SP1 could allow a local attacker to take control of a specific log file on affected installations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insecure File Permissions" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000286019", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000286019" }, { "name": "https://success.trendmicro.com/solution/000286157", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000286157" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-28646", "datePublished": "2021-04-13T12:54:59", "dateReserved": "2021-03-16T00:00:00", "dateUpdated": "2024-08-03T21:47:33.035Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36742
Vulnerability from cvelistv5
Published
2021-07-29 19:23
Modified
2024-08-04 01:01
Severity ?
EPSS score ?
Summary
A improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG and Worry-Free Business Security 10.0 SP1 allows a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000287819 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000287820 | x_refsource_MISC | |
https://success.trendmicro.com/jp/solution/000287796 | x_refsource_MISC | |
https://success.trendmicro.com/jp/solution/000287815 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:01:59.398Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000287819" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000287820" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/jp/solution/000287796" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/jp/solution/000287815" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "A improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG and Worry-Free Business Security 10.0 SP1 allows a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Local Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-29T19:23:14", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000287819" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000287820" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/jp/solution/000287796" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/jp/solution/000287815" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-36742", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG and Worry-Free Business Security 10.0 SP1 allows a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Local Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000287819", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000287819" }, { "name": "https://success.trendmicro.com/solution/000287820", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000287820" }, { "name": "https://success.trendmicro.com/jp/solution/000287796", "refsource": "MISC", "url": "https://success.trendmicro.com/jp/solution/000287796" }, { "name": "https://success.trendmicro.com/jp/solution/000287815", "refsource": "MISC", "url": "https://success.trendmicro.com/jp/solution/000287815" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-36742", "datePublished": "2021-07-29T19:23:14", "dateReserved": "2021-07-14T00:00:00", "dateUpdated": "2024-08-04T01:01:59.398Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24557
Vulnerability from cvelistv5
Published
2020-09-01 18:55
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
A vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 on Microsoft Windows may allow an attacker to manipulate a particular product folder to disable the security temporarily, abuse a specific Windows function and attain privilege escalation. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000263632 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1094/ | x_refsource_MISC | |
https://success.trendmicro.com/solution/000267260 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:19:07.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000263632" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1094/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000267260" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2009 (on premise), SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security ", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 on Microsoft Windows may allow an attacker to manipulate a particular product folder to disable the security temporarily, abuse a specific Windows function and attain privilege escalation. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T21:21:21", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000263632" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1094/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000267260" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-24557", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2009 (on premise), SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security ", "version": { "version_data": [ { "version_value": "10.0 SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 on Microsoft Windows may allow an attacker to manipulate a particular product folder to disable the security temporarily, abuse a specific Windows function and attain privilege escalation. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000263632", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000263632" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1094/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1094/" }, { "name": "https://success.trendmicro.com/solution/000267260", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000267260" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-24557", "datePublished": "2020-09-01T18:55:27", "dateReserved": "2020-08-20T00:00:00", "dateUpdated": "2024-08-04T15:19:07.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42103
Vulnerability from cvelistv5
Published
2021-10-21 07:46
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar but not identical to CVE-2021-42101.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289229 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1213/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.872Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1213/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar but not identical to CVE-2021-42101." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Search Path Element Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-21T07:46:06", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1213/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-42103", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar but not identical to CVE-2021-42101." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Search Path Element Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000289229", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289229" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1213/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1213/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-42103", "datePublished": "2021-10-21T07:46:06", "dateReserved": "2021-10-08T00:00:00", "dateUpdated": "2024-08-04T03:22:25.872Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25240
Vulnerability from cvelistv5
Published
2021-02-04 19:36
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain x64 agent hofitx information.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284202 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284205 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284206 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-113/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.074Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-113/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain x64 agent hofitx information." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T19:36:46", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-113/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25240", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain x64 agent hofitx information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284202", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284202" }, { "name": "https://success.trendmicro.com/solution/000284205", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284205" }, { "name": "https://success.trendmicro.com/solution/000284206", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284206" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-113/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-113/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25240", "datePublished": "2021-02-04T19:36:46", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.074Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41748
Vulnerability from cvelistv5
Published
2022-10-10 00:00
Modified
2024-08-03 12:49
Severity ?
EPSS score ?
Summary
A registry permissions vulnerability in the Trend Micro Apex One Data Loss Prevention (DLP) module could allow a local attacker with administrative credentials to bypass certain elements of the product's anti-tampering mechanisms on affected installations. Please note: an attacker must first obtain administrative credentials on the target system in order to exploit this vulnerability.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:44.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/solution/000291645" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019 (on-prem) and SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "A registry permissions vulnerability in the Trend Micro Apex One Data Loss Prevention (DLP) module could allow a local attacker with administrative credentials to bypass certain elements of the product\u0027s anti-tampering mechanisms on affected installations. Please note: an attacker must first obtain administrative credentials on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Registry Permissions", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-10T00:00:00", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/solution/000291645" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-41748", "datePublished": "2022-10-10T00:00:00", "dateReserved": "2022-09-28T00:00:00", "dateUpdated": "2024-08-03T12:49:44.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36741
Vulnerability from cvelistv5
Published
2021-07-29 19:23
Modified
2024-08-04 01:01
Severity ?
EPSS score ?
Summary
An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product�s management console in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000287819 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000287820 | x_refsource_MISC | |
https://success.trendmicro.com/jp/solution/000287796 | x_refsource_MISC | |
https://success.trendmicro.com/jp/solution/000287815 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:01:59.373Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000287819" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000287820" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/jp/solution/000287796" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/jp/solution/000287815" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product\ufffds management console in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary File Upload", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-29T19:23:13", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000287819" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000287820" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/jp/solution/000287796" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/jp/solution/000287815" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-36741", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product\ufffds management console in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Arbitrary File Upload" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000287819", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000287819" }, { "name": "https://success.trendmicro.com/solution/000287820", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000287820" }, { "name": "https://success.trendmicro.com/jp/solution/000287796", "refsource": "MISC", "url": "https://success.trendmicro.com/jp/solution/000287796" }, { "name": "https://success.trendmicro.com/jp/solution/000287815", "refsource": "MISC", "url": "https://success.trendmicro.com/jp/solution/000287815" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-36741", "datePublished": "2021-07-29T19:23:13", "dateReserved": "2021-07-14T00:00:00", "dateUpdated": "2024-08-04T01:01:59.373Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25246
Vulnerability from cvelistv5
Published
2021-02-04 19:36
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An improper access control information disclosure vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG SP1, and Worry-Free Business Security could allow an unauthenticated user to create a bogus agent on an affected server that could be used then make valid configuration queries.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284202 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284205 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284206 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-117/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.043Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-117/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control information disclosure vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG SP1, and Worry-Free Business Security could allow an unauthenticated user to create a bogus agent on an affected server that could be used then make valid configuration queries." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T19:36:50", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-117/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25246", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control information disclosure vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG SP1, and Worry-Free Business Security could allow an unauthenticated user to create a bogus agent on an affected server that could be used then make valid configuration queries." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284202", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284202" }, { "name": "https://success.trendmicro.com/solution/000284205", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284205" }, { "name": "https://success.trendmicro.com/solution/000284206", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284206" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-117/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-117/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25246", "datePublished": "2021-02-04T19:36:50", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.043Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-40140
Vulnerability from cvelistv5
Published
2022-09-19 18:01
Modified
2024-08-03 12:14
Severity ?
EPSS score ?
Summary
An origin validation error vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to cause a denial-of-service on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000291528 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-1189/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:14:39.803Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000291528" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1189/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019 (on-prem) and SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "An origin validation error vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to cause a denial-of-service on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Origin Validation Error DoS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-19T18:01:02", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000291528" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1189/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2022-40140", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019 (on-prem) and SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An origin validation error vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to cause a denial-of-service on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Origin Validation Error DoS" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000291528", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000291528" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-1189/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1189/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-40140", "datePublished": "2022-09-19T18:01:02", "dateReserved": "2022-09-06T00:00:00", "dateUpdated": "2024-08-03T12:14:39.803Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3848
Vulnerability from cvelistv5
Published
2021-10-06 09:50
Modified
2024-08-03 17:09
Severity ?
EPSS score ?
Summary
An arbitrary file creation by privilege escalation vulnerability in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1, and Worry-Free Business Security Services could allow a local attacker to create an arbitrary file with higher privileges that could lead to a denial-of-service (DoS) on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289183 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:09:09.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289183" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1, Services (SaaS)" } ] } ], "descriptions": [ { "lang": "en", "value": "An arbitrary file creation by privilege escalation vulnerability in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1, and Worry-Free Business Security Services could allow a local attacker to create an arbitrary file with higher privileges that could lead to a denial-of-service (DoS) on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary File Creation by Privliege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-06T09:50:57", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289183" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-3848", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1, Services (SaaS)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An arbitrary file creation by privilege escalation vulnerability in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1, and Worry-Free Business Security Services could allow a local attacker to create an arbitrary file with higher privileges that could lead to a denial-of-service (DoS) on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Arbitrary File Creation by Privliege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000289183", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289183" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-3848", "datePublished": "2021-10-06T09:50:57", "dateReserved": "2021-10-01T00:00:00", "dateUpdated": "2024-08-03T17:09:09.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25771
Vulnerability from cvelistv5
Published
2020-09-28 23:30
Modified
2024-08-04 15:40
Severity ?
EPSS score ?
Summary
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs affected in this vulnerability makes it unique compared to similar CVEs such as CVE-2020-24564 and CVE-2020-25770.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000271974 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1223/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000271974" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1223/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2009, SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs affected in this vulnerability makes it unique compared to similar CVEs such as CVE-2020-24564 and CVE-2020-25770." } ], "problemTypes": [ { "descriptions": [ { "description": "OOB Read Info Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-28T23:30:43", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000271974" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1223/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-25771", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2009, SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs affected in this vulnerability makes it unique compared to similar CVEs such as CVE-2020-24564 and CVE-2020-25770." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "OOB Read Info Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000271974", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000271974" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1223/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1223/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-25771", "datePublished": "2020-09-28T23:30:43", "dateReserved": "2020-09-18T00:00:00", "dateUpdated": "2024-08-04T15:40:36.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42012
Vulnerability from cvelistv5
Published
2021-10-21 07:46
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
A stack-based buffer overflow vulnerability in Trend Micro Apex One, Apex One as a Service and Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289229 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000289230 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1221/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.638Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289230" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1221/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability in Trend Micro Apex One, Apex One as a Service and Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based Buffer Overflow Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-21T07:46:03", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289230" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1221/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-42012", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A stack-based buffer overflow vulnerability in Trend Micro Apex One, Apex One as a Service and Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based Buffer Overflow Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000289229", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289229" }, { "name": "https://success.trendmicro.com/solution/000289230", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289230" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1221/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1221/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-42012", "datePublished": "2021-10-21T07:46:03", "dateReserved": "2021-10-05T00:00:00", "dateUpdated": "2024-08-04T03:22:25.638Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25229
Vulnerability from cvelistv5
Published
2021-02-04 19:36
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about the database server.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284202 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284205 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-104/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One | |
Trend Micro | Trend Micro OfficeScan |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.014Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-104/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about the database server." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T19:36:38", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-104/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25229", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about the database server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284202", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284202" }, { "name": "https://success.trendmicro.com/solution/000284205", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284205" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-104/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-104/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25229", "datePublished": "2021-02-04T19:36:38", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.014Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18188
Vulnerability from cvelistv5
Published
2019-10-28 19:28
Modified
2024-08-05 01:47
Severity ?
EPSS score ?
Summary
Trend Micro Apex One could be exploited by an attacker utilizing a command injection vulnerability to extract files from an arbitrary zip file to a specific folder on the Apex One server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to the IUSR account, which has restricted permission and is unable to make major system changes. An attempted attack requires user authentication.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000151731 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:13.496Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000151731" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "All" } ] } ], "descriptions": [ { "lang": "en", "value": "Trend Micro Apex One could be exploited by an attacker utilizing a command injection vulnerability to extract files from an arbitrary zip file to a specific folder on the Apex One server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to the IUSR account, which has restricted permission and is unable to make major system changes. An attempted attack requires user authentication." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary File Upload with Command Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-28T19:28:32", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000151731" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2019-18188", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "All" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Trend Micro Apex One could be exploited by an attacker utilizing a command injection vulnerability to extract files from an arbitrary zip file to a specific folder on the Apex One server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to the IUSR account, which has restricted permission and is unable to make major system changes. An attempted attack requires user authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Arbitrary File Upload with Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000151731", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000151731" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2019-18188", "datePublished": "2019-10-28T19:28:32", "dateReserved": "2019-10-17T00:00:00", "dateUpdated": "2024-08-05T01:47:13.496Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25241
Vulnerability from cvelistv5
Published
2021-02-04 19:36
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
A server-side request forgery (SSRF) information disclosure vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to locate online agents via a sweep.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284202 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284206 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-114/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.098Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-114/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "A server-side request forgery (SSRF) information disclosure vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to locate online agents via a sweep." } ], "problemTypes": [ { "descriptions": [ { "description": "SSRF Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T19:36:47", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-114/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25241", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A server-side request forgery (SSRF) information disclosure vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to locate online agents via a sweep." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "SSRF Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284202", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284202" }, { "name": "https://success.trendmicro.com/solution/000284206", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284206" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-114/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-114/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25241", "datePublished": "2021-02-04T19:36:47", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.098Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25772
Vulnerability from cvelistv5
Published
2020-09-28 23:30
Modified
2024-08-04 15:40
Severity ?
EPSS score ?
Summary
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs affected in this vulnerability makes it unique compared to similar CVEs such as CVE-2020-24564 and CVE-2020-25771.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000271974 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1222/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000271974" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1222/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2009, SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs affected in this vulnerability makes it unique compared to similar CVEs such as CVE-2020-24564 and CVE-2020-25771." } ], "problemTypes": [ { "descriptions": [ { "description": "OOB Read Info Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-28T23:30:44", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000271974" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1222/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-25772", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2009, SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs affected in this vulnerability makes it unique compared to similar CVEs such as CVE-2020-24564 and CVE-2020-25771." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "OOB Read Info Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000271974", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000271974" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1222/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1222/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-25772", "datePublished": "2020-09-28T23:30:44", "dateReserved": "2020-09-18T00:00:00", "dateUpdated": "2024-08-04T15:40:36.981Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42101
Vulnerability from cvelistv5
Published
2021-10-21 07:46
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar but not identical to CVE-2021-42103.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289229 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1219/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.786Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1219/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar but not identical to CVE-2021-42103." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Search Path Element Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-21T07:46:04", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1219/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-42101", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar but not identical to CVE-2021-42103." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Search Path Element Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000289229", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289229" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1219/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1219/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-42101", "datePublished": "2021-10-21T07:46:04", "dateReserved": "2021-10-08T00:00:00", "dateUpdated": "2024-08-04T03:22:25.786Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-28645
Vulnerability from cvelistv5
Published
2021-04-13 12:54
Modified
2024-08-03 21:47
Severity ?
EPSS score ?
Summary
An incorrect permission assignment vulnerability in Trend Micro Apex One, Apex One as a Service and OfficeScan XG SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000286019 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000286157 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-402/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One | |
Trend Micro | Trend Micro OfficeScan |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:47:33.028Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000286019" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000286157" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-402/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One\r\n", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An incorrect permission assignment vulnerability in Trend Micro Apex One, Apex One as a Service and OfficeScan XG SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Permission Assignment", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-13T12:54:38", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000286019" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000286157" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-402/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-28645", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One\r\n", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An incorrect permission assignment vulnerability in Trend Micro Apex One, Apex One as a Service and OfficeScan XG SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Permission Assignment" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000286019", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000286019" }, { "name": "https://success.trendmicro.com/solution/000286157", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000286157" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-402/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-402/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-28645", "datePublished": "2021-04-13T12:54:38", "dateReserved": "2021-03-16T00:00:00", "dateUpdated": "2024-08-03T21:47:33.028Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-40142
Vulnerability from cvelistv5
Published
2022-09-19 18:01
Modified
2024-08-03 12:14
Severity ?
EPSS score ?
Summary
A security link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service agents could allow a local attacker to create a writable folder in an arbitrary location and escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000291528 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-1190/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:14:39.779Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000291528" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1190/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019 (on-prem) and SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "A security link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service agents could allow a local attacker to create a writable folder in an arbitrary location and escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Agent Link Following LPE", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-19T18:01:04", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000291528" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1190/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2022-40142", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019 (on-prem) and SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A security link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service agents could allow a local attacker to create a writable folder in an arbitrary location and escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Agent Link Following LPE" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000291528", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000291528" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-1190/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1190/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-40142", "datePublished": "2022-09-19T18:01:04", "dateReserved": "2022-09-06T00:00:00", "dateUpdated": "2024-08-03T12:14:39.779Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-28573
Vulnerability from cvelistv5
Published
2020-12-01 18:40
Modified
2024-08-04 16:40
Severity ?
EPSS score ?
Summary
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal the total agents managed by the server.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000281949 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000281947 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1374/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One | |
Trend Micro | Trend Micro OfficeScan |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:40:59.551Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000281949" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000281947" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1374/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal the total agents managed by the server." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-01T18:40:37", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000281949" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000281947" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1374/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-28573", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal the total agents managed by the server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000281949", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000281949" }, { "name": "https://success.trendmicro.com/solution/000281947", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000281947" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1374/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1374/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-28573", "datePublished": "2020-12-01T18:40:37", "dateReserved": "2020-11-12T00:00:00", "dateUpdated": "2024-08-04T16:40:59.551Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24678
Vulnerability from cvelistv5
Published
2022-02-24 02:45
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
An security agent resource exhaustion denial-of-service vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow an attacker to flood a temporary log location and consume all disk space on affected installations.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000290464 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000290486 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-372/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:49.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000290464" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000290486" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-372/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1, Services (SaaS)" } ] } ], "descriptions": [ { "lang": "en", "value": "An security agent resource exhaustion denial-of-service vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow an attacker to flood a temporary log location and consume all disk space on affected installations." } ], "problemTypes": [ { "descriptions": [ { "description": "Resource Exhaustion Denial-of-Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-24T02:45:49", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000290464" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000290486" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-372/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2022-24678", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1, Services (SaaS)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An security agent resource exhaustion denial-of-service vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow an attacker to flood a temporary log location and consume all disk space on affected installations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Resource Exhaustion Denial-of-Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000290464", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000290464" }, { "name": "https://success.trendmicro.com/solution/000290486", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000290486" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-372/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-372/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-24678", "datePublished": "2022-02-24T02:45:49", "dateReserved": "2022-02-09T00:00:00", "dateUpdated": "2024-08-03T04:20:49.099Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41744
Vulnerability from cvelistv5
Published
2022-10-10 00:00
Modified
2024-08-03 12:49
Severity ?
EPSS score ?
Summary
A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One Vulnerability Protection integrated component could allow a local attacker to escalate privileges and turn a specific working directory into a mount point on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.722Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/solution/000291645" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1404/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019 (on-prem) and SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One Vulnerability Protection integrated component could allow a local attacker to escalate privileges and turn a specific working directory into a mount point on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Time-of-Check Time-of-Use LPE", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-10T00:00:00", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/solution/000291645" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1404/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-41744", "datePublished": "2022-10-10T00:00:00", "dateReserved": "2022-09-28T00:00:00", "dateUpdated": "2024-08-03T12:49:43.722Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36336
Vulnerability from cvelistv5
Published
2022-07-29 23:15
Modified
2024-08-03 10:00
Severity ?
EPSS score ?
Summary
A link following vulnerability in the scanning function of Trend Micro Apex One and Worry-Free Business Security agents could allow a local attacker to escalate privileges on affected installations. The resolution for this issue has been deployed automatically via ActiveUpdate to customers in an updated Spyware pattern. Customers who are up-to-date on detection patterns are not required to take any additional steps to mitigate this issue.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000291267 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-1033/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:00:04.319Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000291267" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1033/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019 and SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1 and SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "A link following vulnerability in the scanning function of Trend Micro Apex One and Worry-Free Business Security agents could allow a local attacker to escalate privileges on affected installations. The resolution for this issue has been deployed automatically via ActiveUpdate to customers in an updated Spyware pattern. Customers who are up-to-date on detection patterns are not required to take any additional steps to mitigate this issue." } ], "problemTypes": [ { "descriptions": [ { "description": "Link Following LPE", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-29T23:15:34", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000291267" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1033/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2022-36336", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019 and SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1 and SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A link following vulnerability in the scanning function of Trend Micro Apex One and Worry-Free Business Security agents could allow a local attacker to escalate privileges on affected installations. The resolution for this issue has been deployed automatically via ActiveUpdate to customers in an updated Spyware pattern. Customers who are up-to-date on detection patterns are not required to take any additional steps to mitigate this issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Link Following LPE" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000291267", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000291267" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-1033/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1033/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-36336", "datePublished": "2022-07-29T23:15:34", "dateReserved": "2022-07-20T00:00:00", "dateUpdated": "2024-08-03T10:00:04.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41746
Vulnerability from cvelistv5
Published
2022-10-10 00:00
Modified
2024-08-03 12:49
Severity ?
EPSS score ?
Summary
A forced browsing vulnerability in Trend Micro Apex One could allow an attacker with access to the Apex One console on affected installations to escalate privileges and modify certain agent groupings. Please note: an attacker must first obtain the ability to log onto the Apex One web console in order to exploit this vulnerability.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/solution/000291645" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1403/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019 (on-prem) and SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "A forced browsing vulnerability in Trend Micro Apex One could allow an attacker with access to the Apex One console on affected installations to escalate privileges and modify certain agent groupings. Please note: an attacker must first obtain the ability to log onto the Apex One web console in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Forced Browsing LPE", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-10T00:00:00", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/solution/000291645" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1403/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-41746", "datePublished": "2022-10-10T00:00:00", "dateReserved": "2022-09-28T00:00:00", "dateUpdated": "2024-08-03T12:49:43.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32464
Vulnerability from cvelistv5
Published
2021-08-04 18:29
Modified
2024-08-03 23:17
Severity ?
EPSS score ?
Summary
An incorrect permission assignment privilege escalation vulnerability in Trend Micro Apex One, Apex One as a Service and Worry-Free Business Security Services could allow an attacker to modify a specific script before it is executed. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000287819 | x_refsource_MISC | |
https://success.trendmicro.com/jp/solution/000287796 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000286857 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-910/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:17:29.578Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000287819" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/jp/solution/000287796" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000286857" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-910/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "Services (SaaS)" } ] } ], "descriptions": [ { "lang": "en", "value": "An incorrect permission assignment privilege escalation vulnerability in Trend Micro Apex One, Apex One as a Service and Worry-Free Business Security Services could allow an attacker to modify a specific script before it is executed. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Permission Assignment Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-04T18:29:36", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000287819" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/jp/solution/000287796" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000286857" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-910/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-32464", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "Services (SaaS)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An incorrect permission assignment privilege escalation vulnerability in Trend Micro Apex One, Apex One as a Service and Worry-Free Business Security Services could allow an attacker to modify a specific script before it is executed. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Permission Assignment Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000287819", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000287819" }, { "name": "https://success.trendmicro.com/jp/solution/000287796", "refsource": "MISC", "url": "https://success.trendmicro.com/jp/solution/000287796" }, { "name": "https://success.trendmicro.com/solution/000286857", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000286857" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-910/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-910/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-32464", "datePublished": "2021-08-04T18:29:36", "dateReserved": "2021-05-07T00:00:00", "dateUpdated": "2024-08-03T23:17:29.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-28582
Vulnerability from cvelistv5
Published
2020-12-01 18:40
Modified
2024-08-04 16:40
Severity ?
EPSS score ?
Summary
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal number of managed agents.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000281949 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000281947 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1386/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One | |
Trend Micro | Trend Micro OfficeScan |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:40:59.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000281949" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000281947" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1386/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal number of managed agents." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-01T18:40:39", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000281949" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000281947" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1386/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-28582", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal number of managed agents." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000281949", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000281949" }, { "name": "https://success.trendmicro.com/solution/000281947", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000281947" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1386/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1386/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-28582", "datePublished": "2020-12-01T18:40:39", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-08-04T16:40:59.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25232
Vulnerability from cvelistv5
Published
2021-02-04 19:36
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about the SQL database.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284202 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284205 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-107/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One | |
Trend Micro | Trend Micro OfficeScan |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.106Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-107/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about the SQL database." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T19:36:40", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-107/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25232", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about the SQL database." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284202", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284202" }, { "name": "https://success.trendmicro.com/solution/000284205", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284205" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-107/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-107/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25232", "datePublished": "2021-02-04T19:36:41", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25248
Vulnerability from cvelistv5
Published
2021-02-04 19:36
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An out-of-bounds read information disclosure vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security (10.0 SP1 and Services) could allow an attacker to disclose sensitive information about a named pipe. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284202 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284205 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284206 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-118/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.069Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-118/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1, Services (SaaS)" } ] } ], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read information disclosure vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security (10.0 SP1 and Services) could allow an attacker to disclose sensitive information about a named pipe. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-Bounds Read Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T19:36:51", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-118/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25248", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1, Services (SaaS)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An out-of-bounds read information disclosure vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security (10.0 SP1 and Services) could allow an attacker to disclose sensitive information about a named pipe. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-Bounds Read Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284202", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284202" }, { "name": "https://success.trendmicro.com/solution/000284205", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284205" }, { "name": "https://success.trendmicro.com/solution/000284206", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284206" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-118/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-118/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25248", "datePublished": "2021-02-04T19:36:51", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.069Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24559
Vulnerability from cvelistv5
Published
2020-09-01 18:55
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
A vulnerability in Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services on macOS may allow an attacker to manipulate a certain binary to load and run a script from a user-writable folder, which then would allow them to execute arbitrary code as root. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000263632 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1096/ | x_refsource_MISC | |
https://success.trendmicro.com/solution/000267260 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:19:07.401Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000263632" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1096/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000267260" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2009 (on premise), SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1, Services (SaaS)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services on macOS may allow an attacker to manipulate a certain binary to load and run a script from a user-writable folder, which then would allow them to execute arbitrary code as root. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Hard Link Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T21:21:21", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000263632" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1096/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000267260" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-24559", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2009 (on premise), SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1, Services (SaaS)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services on macOS may allow an attacker to manipulate a certain binary to load and run a script from a user-writable folder, which then would allow them to execute arbitrary code as root. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Hard Link Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000263632", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000263632" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1096/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1096/" }, { "name": "https://success.trendmicro.com/solution/000267260", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000267260" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-24559", "datePublished": "2020-09-01T18:55:27", "dateReserved": "2020-08-20T00:00:00", "dateUpdated": "2024-08-04T15:19:07.401Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44024
Vulnerability from cvelistv5
Published
2022-01-08 15:51
Modified
2024-08-04 04:10
Severity ?
EPSS score ?
Summary
A link following denial-of-service vulnerability in Trend Micro Apex One (on-prem and SaaS) and Trend Micro Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to overwrite arbitrary files in the context of SYSTEM. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289996 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-014/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:10:17.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289996" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-014/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1, Services (SaaS)" } ] } ], "descriptions": [ { "lang": "en", "value": "A link following denial-of-service vulnerability in Trend Micro Apex One (on-prem and SaaS) and Trend Micro Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to overwrite arbitrary files in the context of SYSTEM. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Link Following Denial-of-Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-08T15:51:04", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289996" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-014/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-44024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1, Services (SaaS)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A link following denial-of-service vulnerability in Trend Micro Apex One (on-prem and SaaS) and Trend Micro Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to overwrite arbitrary files in the context of SYSTEM. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Link Following Denial-of-Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000289996", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289996" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-014/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-014/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-44024", "datePublished": "2022-01-08T15:51:04", "dateReserved": "2021-11-18T00:00:00", "dateUpdated": "2024-08-04T04:10:17.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25774
Vulnerability from cvelistv5
Published
2020-09-28 23:30
Modified
2024-08-04 15:40
Severity ?
EPSS score ?
Summary
A vulnerability in the Trend Micro Apex One ServerMigrationTool component could allow an attacker to trigger an out-of-bounds red information disclosure which would disclose sensitive information to an unprivileged account. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000271974 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1225/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.979Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000271974" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1225/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2009, SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Trend Micro Apex One ServerMigrationTool component could allow an attacker to trigger an out-of-bounds red information disclosure which would disclose sensitive information to an unprivileged account. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file." } ], "problemTypes": [ { "descriptions": [ { "description": "OOB Read Info Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-28T23:30:45", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000271974" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1225/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-25774", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2009, SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Trend Micro Apex One ServerMigrationTool component could allow an attacker to trigger an out-of-bounds red information disclosure which would disclose sensitive information to an unprivileged account. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "OOB Read Info Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000271974", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000271974" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1225/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1225/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-25774", "datePublished": "2020-09-28T23:30:45", "dateReserved": "2020-09-18T00:00:00", "dateUpdated": "2024-08-04T15:40:36.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41745
Vulnerability from cvelistv5
Published
2022-10-10 00:00
Modified
2024-08-03 12:49
Severity ?
EPSS score ?
Summary
An Out-of-Bounds access vulnerability in Trend Micro Apex One could allow a local attacker to create a specially crafted message to cause memory corruption on a certain service process which could lead to local privilege escalation on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.818Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/solution/000291645" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1401/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019 (on-prem) and SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "An Out-of-Bounds access vulnerability in Trend Micro Apex One could allow a local attacker to create a specially crafted message to cause memory corruption on a certain service process which could lead to local privilege escalation on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "OOB Access", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-10T00:00:00", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/solution/000291645" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1401/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-41745", "datePublished": "2022-10-10T00:00:00", "dateReserved": "2022-09-28T00:00:00", "dateUpdated": "2024-08-03T12:49:43.818Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42108
Vulnerability from cvelistv5
Published
2021-10-21 07:46
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
Unnecessary privilege vulnerabilities in the Web Console of Trend Micro Apex One, Apex One as a Service and Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289229 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000289230 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1217/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.952Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289230" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1217/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "Unnecessary privilege vulnerabilities in the Web Console of Trend Micro Apex One, Apex One as a Service and Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Unnecessary Privileges Local Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-21T07:46:11", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289230" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1217/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-42108", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unnecessary privilege vulnerabilities in the Web Console of Trend Micro Apex One, Apex One as a Service and Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unnecessary Privileges Local Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000289229", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289229" }, { "name": "https://success.trendmicro.com/solution/000289230", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289230" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1217/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1217/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-42108", "datePublished": "2021-10-21T07:46:11", "dateReserved": "2021-10-08T00:00:00", "dateUpdated": "2024-08-04T03:22:25.952Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25233
Vulnerability from cvelistv5
Published
2021-02-04 19:36
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about a specific configuration download file.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284202 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284205 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000284206 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-108/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.094Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-108/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro OfficeScan", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "XG SP1" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about a specific configuration download file." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T19:36:41", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284202" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284205" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284206" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-108/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25233", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro OfficeScan", "version": { "version_data": [ { "version_value": "XG SP1" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about a specific configuration download file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284202", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284202" }, { "name": "https://success.trendmicro.com/solution/000284205", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284205" }, { "name": "https://success.trendmicro.com/solution/000284206", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284206" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-108/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-108/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25233", "datePublished": "2021-02-04T19:36:41", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42104
Vulnerability from cvelistv5
Published
2021-10-21 07:46
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42105, 42106 and 42107.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289229 | x_refsource_MISC | |
https://success.trendmicro.com/solution/000289230 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1216/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.988Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000289230" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1216/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019, SaaS" } ] }, { "product": "Trend Micro Worry-Free Business Security", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "10.0 SP1, Services (SaaS)" } ] } ], "descriptions": [ { "lang": "en", "value": "Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42105, 42106 and 42107." } ], "problemTypes": [ { "descriptions": [ { "description": "Unnecessary Privileges Local Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-21T07:46:07", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289229" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000289230" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1216/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-42104", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019, SaaS" } ] } }, { "product_name": "Trend Micro Worry-Free Business Security", "version": { "version_data": [ { "version_value": "10.0 SP1, Services (SaaS)" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42105, 42106 and 42107." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unnecessary Privileges Local Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000289229", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289229" }, { "name": "https://success.trendmicro.com/solution/000289230", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000289230" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1216/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1216/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-42104", "datePublished": "2021-10-21T07:46:07", "dateReserved": "2021-10-08T00:00:00", "dateUpdated": "2024-08-04T03:22:25.988Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-40143
Vulnerability from cvelistv5
Published
2022-09-19 18:01
Modified
2024-08-03 12:14
Severity ?
EPSS score ?
Summary
A link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service servers could allow a local attacker to abuse an insecure directory that could allow a low-privileged user to run arbitrary code with elevated privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000291528 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-1191/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:14:39.963Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000291528" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1191/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2019 (on-prem) and SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "A link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service servers could allow a local attacker to abuse an insecure directory that could allow a low-privileged user to run arbitrary code with elevated privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Link Following LPE", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-19T18:01:05", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000291528" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1191/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2022-40143", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2019 (on-prem) and SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service servers could allow a local attacker to abuse an insecure directory that could allow a low-privileged user to run arbitrary code with elevated privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Link Following LPE" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000291528", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000291528" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-1191/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1191/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2022-40143", "datePublished": "2022-09-19T18:01:05", "dateReserved": "2022-09-06T00:00:00", "dateUpdated": "2024-08-03T12:14:39.963Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24564
Vulnerability from cvelistv5
Published
2020-09-28 23:30
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs affected in this vulnerability makes it unique compared to similar CVEs such as CVE-2020-24565 and CVE-2020-25770.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000271974 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1219/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro Apex One |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:19:08.922Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000271974" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1219/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "2009, SaaS" } ] } ], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs affected in this vulnerability makes it unique compared to similar CVEs such as CVE-2020-24565 and CVE-2020-25770." } ], "problemTypes": [ { "descriptions": [ { "description": "OOB Read Info Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-28T23:30:42", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000271974" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1219/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-24564", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro Apex One", "version": { "version_data": [ { "version_value": "2009, SaaS" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs affected in this vulnerability makes it unique compared to similar CVEs such as CVE-2020-24565 and CVE-2020-25770." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "OOB Read Info Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000271974", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000271974" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1219/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1219/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-24564", "datePublished": "2020-09-28T23:30:42", "dateReserved": "2020-08-20T00:00:00", "dateUpdated": "2024-08-04T15:19:08.922Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }