Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-26337: Security Bulletin: Trend Micro Password Manager Uncontrolled Search Path Element Local Privilege Escalation Vulnerability

Trend Micro Password Manager (Consumer) installer version 5.0.0.1262 and below is vulnerable to an Uncontrolled Search Path Element vulnerability that could allow an attacker to use a specially crafted file to exploit the vulnerability and escalate local privileges on the affected machine.

CVE
#vulnerability#mac#windows#microsoft

LAST UPDATED: MAR 03, 2022

Release Date: March 7, 2022

CVE Vulnerability Identifiers: CVE-2022-26337

Platform: Microsoft Windows

CVSSv3 Scores: 4.8

Severity Rating: Medium

Summary

Trend Micro has released a new version of the Installer file of the Trend Micro Password Manager for Windows family of consumer products which resolves an Uncontrolled Search Path Element Local Privilege Escalation vulnerability.

Affected version(s)

PRODUCT

AFFECTED VERSION(S)

PLATFORM

LANGUAGE(S)

Trend Micro Password Manager Installer

5.0.0.1262 and below

Microsoft Windows

English

Solution

PRODUCT

AFFECTED VERSION(S)

PLATFORM

LANGUAGE(S)

Trend Micro Password Manager Installer

5.0.0.1266

Microsoft Windows

English

Trend Micro has released an updated version of the Trend Micro Password Manager installer to resolve this issue. Customers that have the Trend Micro Password Manager program already installed are not affected by this vulnerability. Only customers installing the product using the installer with version number 5.0.0.1262 and below are affected. Customers are advised to use the latest version when doing a fresh installation of the product.

Vulnerability Details

Trend Micro Password Manager (Consumer) installer version 5.0.0.1262 and below is vulnerable to an Uncontrolled Search Path Element vulnerability that could allow an attacker to use a specially crafted file to exploit the vulnerability and escalate local privileges on the affected machine.

Trend Micro has received no reports nor is aware of any actual attacks against the affected product related to this vulnerability at this time.

Acknowledgment

Trend Micro would like to thank the following individual for responsibly disclosing the issue and working with Trend Micro to help protect our customers:

  • DoHyun Lee(@l33d0hyun)

Additional Assistance

Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.

How helpful was this article?

  • It wasn’t helpful at all.

  • Somewhat helpful.

  • Just okay.

  • It was somewhat helpful.

  • It was helpful.

  • *Feedback submitted will only be used as reference for future product, service and article improvements.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907