Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-30703: Security Bulletin: Trend Micro Security Exposed Dangerous Method Information Disclosure Vulnerability

Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an exposed dangerous method vulnerability that could allow an attacker to obtain access to leaked kernel addresses and disclose sensitive information. This vulnerability could also potentially be chained for privilege escalation.

CVE
#vulnerability#windows#microsoft#zero_day

LAST UPDATED: MAY 20, 2022

Release Date: May 20, 2022

CVE Vulnerability Identifier: CVE-2022-30703

Platform(s): Microsoft Windows

CVSSv3 Score: 6.5: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Severity Rating: Medium

Summary

Trend Micro has released a hotfix for the Trend Micro Security for Windows family of consumer products (2021 and 2022) which resolves an exposed dangerous method information disclosure vulnerability.

Affected version(s)

PRODUCT

AFFECTED VERSION(S)

PLATFORM

LANGUAGE(S)

Trend Micro Security

2022 (17.7.1383 and below)

Microsoft Windows

English

Solution

Trend Micro has released a hotfix available for each version below that resolves the issue.

PRODUCT

UPDATED VERSION(S)

PLATFORM

LANGUAGE(S)

Trend Micro Security

2022 (v17.7) Hotfix

Microsoft Windows

English

Trend Micro Security

2021 (v17.0) Hotfix

Windows

English

Vulnerability Details

Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an exposed dangerous method vulnerability that could allow an attacker to obtain access to leaked kernel addresses and disclose sensitive information. This vulnerability could also potentially be chained for privilege escalation.

Trend Micro has received no reports nor is aware of any actual attacks against the affected product related to this vulnerability at this time.

Acknowledgement

Trend Micro would like to thank the following individual for responsibly disclosing the issue and working with Trend Micro to help protect our customers:

  • Anonymous working with Trend Micro Zero Day Initiative

Additional Assistance

Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.

External Reference

The following advisories may be found at Trend Micro’s Zero Day Initiative Published Advisories site:

  • ZDI-CAN-15757

How helpful was this article?

  • It wasn’t helpful at all.

  • Somewhat helpful.

  • Just okay.

  • It was somewhat helpful.

  • It was helpful.

  • *Feedback submitted will only be used as reference for future product, service and article improvements.

Related news

CVE-2022-38108: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-36957: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907