CVE-2023-52094

An updater link following vulnerability in the Trend Micro Apex One agent could allow a local attacker to abuse the updater to delete an arbitrary folder, leading for a local privilege escalation on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:trendmicro:apex_one:*:*:*:*:saas:*:*:*
cpe:2.3:a:trendmicro:apex_one:2019:-:*:*:*:*:*:*

History

30 Jan 2024, 17:37

Type Values Removed Values Added
First Time Trendmicro apex One
Trendmicro
References () https://success.trendmicro.com/dcx/s/solution/000296151?language=en_US - () https://success.trendmicro.com/dcx/s/solution/000296151?language=en_US - Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-24-028/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-028/ - Third Party Advisory, VDB Entry
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:a:trendmicro:apex_one:*:*:*:*:saas:*:*:*
cpe:2.3:a:trendmicro:apex_one:2019:-:*:*:*:*:*:*
CWE CWE-59

24 Jan 2024, 13:49

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de updater link following en el agente Trend Micro Apex One podría permitir que un atacante local abuse del actualizador para eliminar una carpeta arbitraria, lo que provocaría una escalada de privilegios locales en las instalaciones afectadas. Tenga en cuenta: un atacante primero debe obtener la capacidad de ejecutar código con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad.

23 Jan 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-23 21:15

Updated : 2024-01-30 17:37


NVD link : CVE-2023-52094

Mitre link : CVE-2023-52094

CVE.ORG link : CVE-2023-52094


JSON object : View

Products Affected

trendmicro

  • apex_one
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')