CVE-2022-28339
Trend Micro HouseCall for Home Networks Uncontrolled Search Path Element Privilege Escalation Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Trend Micro HouseCall for Home Networks version 5.3.1302 and below contains an uncontrolled search patch element vulnerability that could allow an attacker with low user privileges to create a malicious DLL that could lead to escalated privileges.
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro HouseCall for Home Networks. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the log4j scanner. The process loads a file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of an administrator.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2022-04-01 CVE Reserved
- 2022-04-12 CVE Published
- 2025-02-24 CVE Updated
- 2025-04-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-427: Uncontrolled Search Path Element
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://helpcenter.trendmicro.com/en-us/article/tmka-21734 | ||
https://www.zerodayinitiative.com/advisories/ZDI-22-620 |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Trend Micro, Inc. Search vendor "Trend Micro, Inc." | Trend Micro HouseCall For Home Networks Search vendor "Trend Micro, Inc." for product "Trend Micro HouseCall For Home Networks" | >= 5.3.0 < 5.3.1308 Search vendor "Trend Micro, Inc." for product "Trend Micro HouseCall For Home Networks" and version " >= 5.3.0 < 5.3.1308" | en |
Affected
|