CVE-2022-45798
CVSS V2 None
CVSS V3 None
Description
A link following vulnerability in the Damage Cleanup Engine component of Trend Micro Apex One and Trend Micro Apex One as a Service could allow a local attacker to escalate privileges by creating a symbolic link and abusing the service to delete a file. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Overview
- CVE ID
- CVE-2022-45798
- Assigner
- security@trendmicro.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-12-24T00:15:08
- Last Modified Date
- 2023-01-13T14:05:12
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:a:trendmicro:apex_one:-:*:*:*:saas:*:*:* | 1 | OR | ||
cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:-:*:*:* | 1 | OR | ||
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* | 0 | OR |
References
Reference URL | Reference Tags |
---|---|
https://success.trendmicro.com/solution/000291830 | |
https://www.zerodayinitiative.com/advisories/ZDI-22-1665/ |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-45798 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45798 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-12-24 00:18:38 | Added to TrackCVE | |||
2022-12-25 02:16:03 | 2022-12-25T02:07:49 | CVE Modified Date | updated | |
2022-12-25 02:16:04 | Received | Awaiting Analysis | Vulnerability Status | updated |
2022-12-29 15:13:52 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-13 14:14:38 | 2023-01-13T14:05:12 | CVE Modified Date | updated | |
2023-01-13 14:14:38 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-13 14:14:38 | Weakness Enumeration | new | ||
2023-01-13 14:14:38 | CPE Information | updated |