Headline
CVE-2022-30702: Security Bulletin: Trend Micro Security Out-Of-Bounds Read Information Disclosure Vulnerability
Trend Micro Security 2022 and 2021 (Consumer) is vulnerable to an Out-Of-Bounds Read Information Disclosure vulnerability that could allow an attacker to disclose sensitive information on an affected machine.
LAST UPDATED: MAY 20, 2022
Release Date: May 20, 2022
CVE Vulnerability Identifier: CVE-2022-30702
Platform(s): Microsoft Windows
CVSSv3 Score: 7.3: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
Summary
Trend Micro has released a hotfix for the Trend Micro Security for Windows family of consumer products which resolves an Out-Of-Bounds Read Information Disclosure vulnerability.
Affected version(s)
PRODUCT
AFFECTED VERSION(S)
PLATFORM
LANGUAGE(S)
Trend Micro Security
2022 (17.7.1130 and below)
Microsoft Windows
English
Solution
Trend Micro has released a hotfix available for each version below that resolves the issue.
PRODUCT
UPDATED VERSION(S)
PLATFORM
LANGUAGE(S)
Trend Micro Security
2022 (v17.7) Hotfix
Microsoft Windows
English
Trend Micro Security
2021 (v17.0) Hotfix
Windows
English
Vulnerability Details
Trend Micro Security 2022 (Consumer) is vulnerable to an Out-Of-Bounds Read Information Disclosure vulnerability that could allow an attacker to disclose sensitive information on an affected machine.
Trend Micro has received no reports nor is aware of any actual attacks against the affected product related to this vulnerability at this time.
Acknowledgement
Trend Micro would like to thank the following individual for responsibly disclosing the issue and working with Trend Micro to help protect our customers:
- Anonymous working with Trend Micro Zero Day Initiative
Additional Assistance
Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.
External Reference
The following advisories may be found at Trend Micro’s Zero Day Initiative Published Advisories site:
- ZDI-CAN-15756
How helpful was this article?
It wasn’t helpful at all.
Somewhat helpful.
Just okay.
It was somewhat helpful.
It was helpful.
*Feedback submitted will only be used as reference for future product, service and article improvements.
Related news
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.