CVE-2022-24671Link Following in Antivirus

CWE-59Link Following3 documents3 sources
Severity
7.8HIGHNVD
EPSS
0.1%
top 65.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 24
Latest updateFeb 25

Description

A link following privilege escalation vulnerability in Trend Micro Antivirus for Max 11.0.2150 and below could allow a local attacker to modify a file during the update process and escalate their privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

NVDtrendmicro/antivirus11.0.2150
CVEListV5trend_micro/trend_micro_antivirus_for_mac11.0.2150 and below

🔴Vulnerability Details

2
GHSA
GHSA-2q9m-v2c6-q9rc: A link following privilege escalation vulnerability in Trend Micro Antivirus for Max 112022-02-25
CVEList
CVE-2022-24671: A link following privilege escalation vulnerability in Trend Micro Antivirus for Max 112022-02-24
CVE-2022-24671 — Link Following in Trendmicro Antivirus | cvebase