Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-30523: Security Bulletin: Trend Micro Password Manager Link Following Privilege Escalation Vulnerability

Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Privilege Escalation Vulnerability that could allow a low privileged local attacker to delete the contents of an arbitrary folder as SYSTEM which can then be used for privilege escalation on the affected machine.

CVE
#vulnerability#mac#windows#microsoft#zero_day

LAST UPDATED: MAY 10, 2022

Release Date: May 10, 2022

CVE Vulnerability Identifier: CVE-2022-30523

Platform(s): Microsoft Windows

Severity Rating: High

Summary

Trend Micro has released a new version of the Trend Micro Password Manager for Windows family of consumer products which resolves a Link Following Privilege Escalation Vulnerability.

Affected version(s)

PRODUCT

AFFECTED VERSION(S)

PLATFORM

LANGUAGE(S)

Trend Micro Password Manager

5.0.0.1266 and below

Microsoft Windows

English

Solution

PRODUCT

UPDATED VERSION(S)

PLATFORM

LANGUAGE(S)

Trend Micro Password Manager

5.0.0.1270

Microsoft Windows

English

Trend Micro has released an update via the product’s automatic update mechanism to resolve this issue. Your Trend Micro Password Manager program should receive the update automatically as long as your computer is connected to the Internet. Customers are advised to use the latest version when doing a fresh installation of the product.

Vulnerability Details

Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Privilege Escalation Vulnerability that could allow a low privileged local attacker to delete the contents of an arbitrary folder as SYSTEM which can then be used for privilege escalation on the affected machine.

Trend Micro has received no reports nor is aware of any actual attacks against the affected product related to this vulnerability at this time.

Acknowledgement

Trend Micro would like to thank the following individual for responsibly disclosing the issue and working with Trend Micro to help protect our customers:

  • @Kharosx0 working with Trend Micro Zero Day Initiative (ZDI)

Additional Assistance

Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.

External Reference

The following advisories may be found at Trend Micro’s Zero Day Initiative Published Advisories site:

  • ZDI-CAN-16159

How helpful was this article?

  • It wasn’t helpful at all.

  • Somewhat helpful.

  • Just okay.

  • It was somewhat helpful.

  • It was helpful.

  • *Feedback submitted will only be used as reference for future product, service and article improvements.

Related news

CVE-2022-38108: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-36957: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907