Page 21 of 485 results (0.006 seconds)

CVSS: 7.2EPSS: 1%CPEs: 3EXPL: 0

Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution. Please note: an attacker must first obtain Apex One server administration console access in order to exploit this vulnerability. Una comprobación inapropiada de algunos componentes usados por el mecanismo de reversión en los clientes de Trend Micro Apex One y Trend Micro Apex One as a Service podría permitir a un administrador del servidor Apex One indicar a clientes afectados descargar un paquete de reversión no verificado, lo que podría conllevar a una ejecución de código remota. Nota: un atacante debe obtener primero el acceso a la consola de administración del servidor Apex One para poder explotar esta vulnerabilidad Trend Micro Apex One and Apex One as a Service contain an improper validation of rollback mechanism components that could lead to remote code execution. • https://success.trendmicro.com/solution/000291528 •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

A vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service could allow an attacker to bypass the product's login authentication by falsifying request parameters on affected installations. Una vulnerabilidad en Trend Micro Apex One y Trend Micro Apex One as a Service podría permitir a un atacante omitir la autenticación de inicio de sesión del producto al falsificar los parámetros de petición en las instalaciones afectadas • https://appweb.trendmicro.com/SupportNews/NewsDetail.aspx?id=4553 https://jvn.jp/en/jp/JVN36454862/index.html https://success.trendmicro.com/solution/000291528 https://www.ipa.go.jp/security/ciadr/vul/20220913-jvn.html • CWE-287: Improper Authentication •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 1

An origin validation error vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to cause a denial-of-service on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de error de comprobación de origen en Trend Micro Apex One y Apex One as a Service podría permitir a un atacante local causar una denegación de servicio en las instalaciones afectadas. Nota: un atacante debe obtener primero la capacidad de ejecutar código con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Apex One NT Listener service. • https://github.com/ipsBruno/CVE-2022-40140-SCANNER https://success.trendmicro.com/solution/000291528 https://www.zerodayinitiative.com/advisories/ZDI-22-1189 • CWE-346: Origin Validation Error •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

A security link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service agents could allow a local attacker to create a writable folder in an arbitrary location and escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Un enlace de seguridad que sigue a la vulnerabilidad de escalada de privilegios local en los agentes Trend Micro Apex One y Trend Micro Apex One as a Service podría permitir a un atacante local crear una carpeta con capacidad de escritura en una ubicación arbitraria y escalar privilegios en las instalaciones afectadas. Nota: un atacante debe obtener primero la capacidad de ejecutar código con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the NT Apex One RealTime Scan Service. • https://success.trendmicro.com/solution/000291528 https://www.zerodayinitiative.com/advisories/ZDI-22-1190 • CWE-269: Improper Privilege Management •

CVSS: 7.3EPSS: 0%CPEs: 3EXPL: 0

A link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service servers could allow a local attacker to abuse an insecure directory that could allow a low-privileged user to run arbitrary code with elevated privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de escalada de privilegios local en los servidores de Trend Micro Apex One y Trend Micro Apex One as a Service podría permitir a un atacante local abusar de un directorio no seguro que podría permitir a un usuario poco privilegiado ejecutar código arbitrario con altos privilegios. Nota: un atacante debe obtener primero la capacidad de ejecutar código con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Local Web Classification Service. • https://success.trendmicro.com/solution/000291528 https://www.zerodayinitiative.com/advisories/ZDI-22-1191 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •