CVE-2022-30523

CWE-593 documents3 sources
Severity
7.8HIGH
EPSS
0.0%
top 87.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 16
Latest updateMay 17

Description

Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Privilege Escalation Vulnerability that could allow a low privileged local attacker to delete the contents of an arbitrary folder as SYSTEM which can then be used for privilege escalation on the affected machine.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

NVDtrendmicro/password_manager< 5.0.0.1270
CVEListV5trend_micro/trend_micro_password_manager5.0.0.1266 and below

🔴Vulnerability Details

2
GHSA
GHSA-rmw3-4v45-rj33: Trend Micro Password Manager (Consumer) version 52022-05-17
CVEList
CVE-2022-30523: Trend Micro Password Manager (Consumer) version 52022-05-16
CVE-2022-30523 (HIGH CVSS 7.8) | Trend Micro Password Manager (Consu | cvebase.io