GSD-2022-40709
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This vulnerability is similar to, but not identical to CVE-2022-40707 and 40708.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2022-40709",
"description": "An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This vulnerability is similar to, but not identical to CVE-2022-40707 and 40708.",
"id": "GSD-2022-40709"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-40709"
],
"details": "An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This vulnerability is similar to, but not identical to CVE-2022-40707 and 40708.",
"id": "GSD-2022-40709",
"modified": "2023-12-13T01:19:30.258868Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@trendmicro.com",
"ID": "CVE-2022-40709",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Trend Micro Deep Security",
"version": {
"version_data": [
{
"version_value": "20"
}
]
}
}
]
},
"vendor_name": "Trend Micro"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This vulnerability is similar to, but not identical to CVE-2022-40707 and 40708."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-Of-Bounds Read Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://success.trendmicro.com/solution/000291590",
"refsource": "MISC",
"url": "https://success.trendmicro.com/solution/000291590"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-22-1299/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1299/"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:-:*:*:long_term_support:*:*:*",
"matchCriteriaId": "34026BD4-6637-4267-BAFC-BF25927AF220",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1337:*:*:long_term_support:*:*:*",
"matchCriteriaId": "395BE207-3450-4DD8-A5B4-CA005A8A29E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1559:*:*:long_term_support:*:*:*",
"matchCriteriaId": "10692943-0205-42F3-8EBC-64499CC0A3D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update158:*:*:long_term_support:*:*:*",
"matchCriteriaId": "4CD4971B-80E4-45E5-9895-34EA463D408C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update167:*:*:long_term_support:*:*:*",
"matchCriteriaId": "13310EBF-97B9-4266-9384-82550A55EBC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1681:*:*:long_term_support:*:*:*",
"matchCriteriaId": "F3DDAC1A-C2E5-4FFB-8A69-80819D39CF5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update173:*:*:long_term_support:*:*:*",
"matchCriteriaId": "B5363299-C02D-4AB8-8C48-0A3AFF4F2D33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update180:*:*:long_term_support:*:*:*",
"matchCriteriaId": "A2A56B00-44A5-451C-B8D0-19097E3A9C69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update182:*:*:long_term_support:*:*:*",
"matchCriteriaId": "F1C90C28-9413-407B-BC1D-3F4037BDF235",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1822:*:*:long_term_support:*:*:*",
"matchCriteriaId": "6201FA1A-1F94-46DF-A7EE-6F4DE2910131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update183:*:*:long_term_support:*:*:*",
"matchCriteriaId": "D2CD4BBE-7C1B-4FA8-98E5-D2DD2E2AAD26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1876:*:*:long_term_support:*:*:*",
"matchCriteriaId": "E667A20B-65ED-434F-8A5F-220C87B175EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update190:*:*:long_term_support:*:*:*",
"matchCriteriaId": "2F74BA58-9388-4715-9477-FC1005765FA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update198:*:*:long_term_support:*:*:*",
"matchCriteriaId": "8665FF69-6034-4D5F-8E2D-8DB1E07C7BE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2009:*:*:long_term_support:*:*:*",
"matchCriteriaId": "2CCE7E62-6CBE-476F-A9E5-52790F90E5BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update208:*:*:long_term_support:*:*:*",
"matchCriteriaId": "3912DDD3-A3B0-487F-A74A-9A529D69FFFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update213:*:*:long_term_support:*:*:*",
"matchCriteriaId": "4D555FC6-8986-4891-90CC-DB4F24990167",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2204:*:*:long_term_support:*:*:*",
"matchCriteriaId": "920B4F3B-2D78-4B71-8B65-8AEF6AF2C735",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update223:*:*:long_term_support:*:*:*",
"matchCriteriaId": "E68C5D12-3E35-43D3-A5A0-2C029EFA0182",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update224:*:*:long_term_support:*:*:*",
"matchCriteriaId": "0C49595B-D6E5-42CC-B634-5F14B868C341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2419:*:*:long_term_support:*:*:*",
"matchCriteriaId": "236653DA-EE2C-4923-A5C8-CC32305626FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2593:*:*:long_term_support:*:*:*",
"matchCriteriaId": "A61BF475-18D9-4246-91C7-7A1B6A7B44AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2740:*:*:long_term_support:*:*:*",
"matchCriteriaId": "DC90635A-4FEB-4F7A-B0BD-D4CCD1183A3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2921:*:*:long_term_support:*:*:*",
"matchCriteriaId": "6D12CADF-AAA4-4E0B-93EC-81C5C3BDCA47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3165:*:*:long_term_support:*:*:*",
"matchCriteriaId": "9FD0C979-641F-482B-9D05-B3B9A5F6D443",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3288:*:*:long_term_support:*:*:*",
"matchCriteriaId": "F56F3E88-3E65-4C3E-932D-6C8404F5A1BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3445:*:*:long_term_support:*:*:*",
"matchCriteriaId": "2FF0DE00-851E-4185-8C0C-172252E3E7C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3530:*:*:long_term_support:*:*:*",
"matchCriteriaId": "57A322DB-9E37-4508-B904-51F0305D4B9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3771:*:*:long_term_support:*:*:*",
"matchCriteriaId": "9CEFF34B-1B17-416F-9068-9CE5DAC0F19D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3964:*:*:long_term_support:*:*:*",
"matchCriteriaId": "87A77C12-0F5C-4EA7-96BA-8B14E2795E69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4185:*:*:long_term_support:*:*:*",
"matchCriteriaId": "87821A85-93F2-422B-8876-CF3729D99594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4416:*:*:long_term_support:*:*:*",
"matchCriteriaId": "0C3E959C-D6D5-4DF0-A26E-95EBDCB8C901",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4726:*:*:long_term_support:*:*:*",
"matchCriteriaId": "F2F3C583-2A09-4448-B384-273B48D2B4E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4959:*:*:long_term_support:*:*:*",
"matchCriteriaId": "445BA171-0190-429A-8D4F-F857CEA5361E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5137:*:*:long_term_support:*:*:*",
"matchCriteriaId": "95889F1E-931E-40E4-99A1-9C1A4A8B0847",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update877:*:*:long_term_support:*:*:*",
"matchCriteriaId": "BF1E7ABB-DEF9-4CBD-B269-3091DC1CF2A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"descriptions": [
{
"lang": "en",
"value": "An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This vulnerability is similar to, but not identical to CVE-2022-40707 and 40708."
},
{
"lang": "es",
"value": "Una vulnerabilidad de lectura fuera de l\u00edmites en Trend Micro Deep Security 20 y Cloud One - Workload Security Agent para Windows podr\u00eda permitir a un atacante local divulgar informaci\u00f3n confidencial en las instalaciones afectadas. Tenga en cuenta que un atacante debe obtener primero la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder explotar estas vulnerabilidades. Esta vulnerabilidad es similar, pero no id\u00e9ntica, a las CVE-2022-40707 y 40708"
}
],
"id": "CVE-2022-40709",
"lastModified": "2024-02-27T20:39:59.900",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-09-28T21:15:15.190",
"references": [
{
"source": "security@trendmicro.com",
"tags": [
"Vendor Advisory"
],
"url": "https://success.trendmicro.com/solution/000291590"
},
{
"source": "security@trendmicro.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1299/"
}
],
"sourceIdentifier": "security@trendmicro.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…