Headline
CVE-2022-30687: ZDI-22-789
Trend Micro Maximum Security 2022 is vulnerable to a link following vulnerability that could allow a low privileged local user to manipulate the product’s secure erase feature to delete arbitrary files.
May 26th, 2022
Trend Micro Maximum Security Link Following Arbitrary File Deletion Vulnerability****ZDI-22-789
ZDI-CAN-15739
CVE ID
CVE-2022-30687
CVSS SCORE
6.1, (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)
AFFECTED VENDORS
Trend Micro
AFFECTED PRODUCTS
Maximum Security
VULNERABILITY DETAILS
This vulnerability allows local attackers to delete arbitrary files on affected installations of Trend Micro Maximum Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the implementation of the Secure Erase feature. The issue results from the lack of proper validation of a user-supplied link prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of SYSTEM.
ADDITIONAL DETAILS
Trend Micro has issued an update to correct this vulnerability. More details can be found at:
https://helpcenter.trendmicro.com/en-us/article/tmka-11017
DISCLOSURE TIMELINE
- 2022-01-14 - Vulnerability reported to vendor
- 2022-05-26 - Coordinated public release of advisory
CREDIT
Amir Ahmadi (@KingAmir )
BACK TO ADVISORIES
Related news
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.