CVE-2022-30523

Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Privilege Escalation Vulnerability that could allow a low privileged local attacker to delete the contents of an arbitrary folder as SYSTEM which can then be used for privilege escalation on the affected machine.
Configurations

Configuration 1 (hide)

cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:windows:*:*

History

25 May 2022, 14:47

Type Values Removed Values Added
CWE CWE-59
CPE cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:windows:*:*
First Time Trendmicro
Trendmicro password Manager
CVSS v2 : unknown
v3 : unknown
v2 : 7.2
v3 : 7.8
References (MISC) https://helpcenter.trendmicro.com/en-us/article/tmka-09071 - (MISC) https://helpcenter.trendmicro.com/en-us/article/tmka-09071 - Vendor Advisory
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-22-759/ - (MISC) https://www.zerodayinitiative.com/advisories/ZDI-22-759/ - Third Party Advisory, VDB Entry

16 May 2022, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-16 15:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-30523

Mitre link : CVE-2022-30523

CVE.ORG link : CVE-2022-30523


JSON object : View

Products Affected

trendmicro

  • password_manager
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')