Page 11 of 140 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

An origin validation error vulnerability in Trend Micro Apex One agents could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de error de comprobación de origen en los agentes Trend Micro Apex One podría permitir a un atacante local escalar privilegios en las instalaciones afectadas. Nota: un atacante debe obtener primero la capacidad de ejecutar código poco privilegiado en el sistema de destino para poder explotar esta vulnerabilidad This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Apex One NT Listener service. • https://success.trendmicro.com/solution/000291645 https://www.zerodayinitiative.com/advisories/ZDI-22-1400 • CWE-346: Origin Validation Error •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 0

A forced browsing vulnerability in Trend Micro Apex One could allow an attacker with access to the Apex One console on affected installations to escalate privileges and modify certain agent groupings. Please note: an attacker must first obtain the ability to log onto the Apex One web console in order to exploit this vulnerability. Una vulnerabilidad de navegación forzada en Trend Micro Apex One podría permitir a un atacante con acceso a la consola de Apex One en las instalaciones afectadas escalar privilegios y modificar determinadas agrupaciones de agentes. Nota: un atacante debe obtener primero la capacidad de iniciar sesión en la consola web de Apex One para poder explotar esta vulnerabilidad This vulnerability allows remote attackers to escalate privileges on affected installations of Trend Micro Apex One. Authentication is required to exploit this vulnerability. The specific flaw exists within the Apex One web console. • https://success.trendmicro.com/solution/000291645 https://www.zerodayinitiative.com/advisories/ZDI-22-1403 • CWE-425: Direct Request ('Forced Browsing') •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

An improper certification validation vulnerability in Trend Micro Apex One agents could allow a local attacker to load a DLL file with system service privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de comprobación de certificación inapropiada en los agentes de Trend Micro Apex One podría permitir a un atacante local cargar un archivo DLL con privilegios de servicio del sistema en las instalaciones afectadas. Nota: un atacante debe obtener primero la capacidad de ejecutar código poco privilegiado en el sistema de destino para poder explotar esta vulnerabilidad This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Apex One Client Plug-in Service Manager. • https://success.trendmicro.com/solution/000291645 https://www.zerodayinitiative.com/advisories/ZDI-22-1402 • CWE-295: Improper Certificate Validation •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

A vulnerability in Trend Micro Apex One and Apex One as a Service could allow an attacker to intercept and decode certain communication strings that may contain some identification attributes of a particular Apex One server. Una vulnerabilidad en Trend Micro Apex One y Apex One as a Service podría permitir a un atacante interceptar y decodificar determinadas cadenas de comunicación que pueden contener algunos atributos de identificación de un servidor Apex One en particular • https://success.trendmicro.com/solution/000291528 •

CVSS: 7.2EPSS: 1%CPEs: 3EXPL: 0

Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution. Please note: an attacker must first obtain Apex One server administration console access in order to exploit this vulnerability. Una comprobación inapropiada de algunos componentes usados por el mecanismo de reversión en los clientes de Trend Micro Apex One y Trend Micro Apex One as a Service podría permitir a un administrador del servidor Apex One indicar a clientes afectados descargar un paquete de reversión no verificado, lo que podría conllevar a una ejecución de código remota. Nota: un atacante debe obtener primero el acceso a la consola de administración del servidor Apex One para poder explotar esta vulnerabilidad Trend Micro Apex One and Apex One as a Service contain an improper validation of rollback mechanism components that could lead to remote code execution. • https://success.trendmicro.com/solution/000291528 •