CVE-2022-48191

A vulnerability exists in Trend Micro Maximum Security 2022 (17.7) wherein a low-privileged user can write a known malicious executable to a specific location and in the process of removal and restoral an attacker could replace an original folder with a mount point to an arbitrary location, allowing a escalation of privileges on an affected system.
References
Link Resource
https://helpcenter.trendmicro.com/en-us/article/tmka-11252 Patch Vendor Advisory
https://www.zerodayinitiative.com/advisories/ZDI-23-053/ Patch Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:trendmicro:maximum_security_2022:17.7:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

26 Jan 2023, 16:45

Type Values Removed Values Added
First Time Microsoft windows
Microsoft
Trendmicro maximum Security 2022
Trendmicro
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.0
CWE CWE-367
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:maximum_security_2022:17.7:*:*:*:*:*:*:*
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-23-053/ - (MISC) https://www.zerodayinitiative.com/advisories/ZDI-23-053/ - Patch, Third Party Advisory, VDB Entry
References (MISC) https://helpcenter.trendmicro.com/en-us/article/tmka-11252 - (MISC) https://helpcenter.trendmicro.com/en-us/article/tmka-11252 - Patch, Vendor Advisory

20 Jan 2023, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-01-20 07:15

Updated : 2023-12-10 14:48


NVD link : CVE-2022-48191

Mitre link : CVE-2022-48191

CVE.ORG link : CVE-2022-48191


JSON object : View

Products Affected

microsoft

  • windows

trendmicro

  • maximum_security_2022
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition