Headline
CVE-2022-38764: ZDI-22-1178
A vulnerability on Trend Micro HouseCall version 1.62.1.1133 and below could allow a local attacker to escalate privlieges due to an overly permissive folder om the product installer.
August 31st, 2022
Trend Micro HouseCall Incorrect Permission Assignment Privilege Escalation Vulnerability****ZDI-22-1178
ZDI-CAN-16829
CVE ID
CVE-2022-38764
CVSS SCORE
7.3, (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)
AFFECTED VENDORS
Trend Micro
AFFECTED PRODUCTS
HouseCall
VULNERABILITY DETAILS
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro HouseCall. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the product installer. The issue results from incorrect permissions set on product folders created by the installer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of an administrator.
ADDITIONAL DETAILS
Trend Micro has issued an update to correct this vulnerability. More details can be found at:
https://helpcenter.trendmicro.com/en-us/article/tmka-11092
DISCLOSURE TIMELINE
- 2022-04-29 - Vulnerability reported to vendor
- 2022-08-31 - Coordinated public release of advisory
CREDIT
Xavier Danest - Decathlon
BACK TO ADVISORIES
Related news
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.