CVE-2022-34893

Trend Micro Security 2022 (consumer) has a link following vulnerability where an attacker with lower privileges could manipulate a mountpoint which could lead to escalation of privilege on an affected machine.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:trendmicro:security:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

22 Sep 2022, 14:57

Type Values Removed Values Added
References (N/A) https://www.zerodayinitiative.com/advisories/ZDI-22-1175/ - (N/A) https://www.zerodayinitiative.com/advisories/ZDI-22-1175/ - Third Party Advisory, VDB Entry
References (N/A) https://helpcenter.trendmicro.com/en-us/article/tmka-11053 - (N/A) https://helpcenter.trendmicro.com/en-us/article/tmka-11053 - Patch, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:a:trendmicro:security:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
CWE CWE-59
First Time Microsoft windows
Microsoft
Trendmicro
Trendmicro security

19 Sep 2022, 18:33

Type Values Removed Values Added
New CVE

Information

Published : 2022-09-19 18:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-34893

Mitre link : CVE-2022-34893

CVE.ORG link : CVE-2022-34893


JSON object : View

Products Affected

microsoft

  • windows

trendmicro

  • security
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')