Lucene search

K
cve[email protected]CVE-2022-40710
HistorySep 28, 2022 - 9:15 p.m.

CVE-2022-40710

2022-09-2821:15:15
CWE-59
web.nvd.nist.gov
23
7
trend micro
deep security
cloud one
workload security
windows
cve-2022-40710
vulnerability
privilege escalation
nvd

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

16.0%

A link following vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Affected configurations

NVD
Node
trendmicrodeep_security_agentMatch20.0-long_term_support
OR
trendmicrodeep_security_agentMatch20.0update1337long_term_support
OR
trendmicrodeep_security_agentMatch20.0update1559long_term_support
OR
trendmicrodeep_security_agentMatch20.0update158long_term_support
OR
trendmicrodeep_security_agentMatch20.0update167long_term_support
OR
trendmicrodeep_security_agentMatch20.0update1681long_term_support
OR
trendmicrodeep_security_agentMatch20.0update173long_term_support
OR
trendmicrodeep_security_agentMatch20.0update180long_term_support
OR
trendmicrodeep_security_agentMatch20.0update182long_term_support
OR
trendmicrodeep_security_agentMatch20.0update1822long_term_support
OR
trendmicrodeep_security_agentMatch20.0update183long_term_support
OR
trendmicrodeep_security_agentMatch20.0update1876long_term_support
OR
trendmicrodeep_security_agentMatch20.0update190long_term_support
OR
trendmicrodeep_security_agentMatch20.0update198long_term_support
OR
trendmicrodeep_security_agentMatch20.0update2009long_term_support
OR
trendmicrodeep_security_agentMatch20.0update208long_term_support
OR
trendmicrodeep_security_agentMatch20.0update213long_term_support
OR
trendmicrodeep_security_agentMatch20.0update2204long_term_support
OR
trendmicrodeep_security_agentMatch20.0update223long_term_support
OR
trendmicrodeep_security_agentMatch20.0update224long_term_support
OR
trendmicrodeep_security_agentMatch20.0update2419long_term_support
OR
trendmicrodeep_security_agentMatch20.0update2593long_term_support
OR
trendmicrodeep_security_agentMatch20.0update2740long_term_support
OR
trendmicrodeep_security_agentMatch20.0update2921long_term_support
OR
trendmicrodeep_security_agentMatch20.0update3165long_term_support
OR
trendmicrodeep_security_agentMatch20.0update3288long_term_support
OR
trendmicrodeep_security_agentMatch20.0update3445long_term_support
OR
trendmicrodeep_security_agentMatch20.0update3530long_term_support
OR
trendmicrodeep_security_agentMatch20.0update3771long_term_support
OR
trendmicrodeep_security_agentMatch20.0update3964long_term_support
OR
trendmicrodeep_security_agentMatch20.0update4185long_term_support
OR
trendmicrodeep_security_agentMatch20.0update4416long_term_support
OR
trendmicrodeep_security_agentMatch20.0update4726long_term_support
OR
trendmicrodeep_security_agentMatch20.0update4959long_term_support
OR
trendmicrodeep_security_agentMatch20.0update5137long_term_support
OR
trendmicrodeep_security_agentMatch20.0update877long_term_support
AND
microsoftwindowsMatch-

CNA Affected

[
  {
    "product": "Trend Micro Deep Security",
    "vendor": "Trend Micro",
    "versions": [
      {
        "status": "affected",
        "version": "20.0",
        "lessThan": "20.0.0.5394",
        "versionType": "semver"
      }
    ]
  }
]

Social References

More

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

16.0%

Related for CVE-2022-40710