CVE-2023-52094Link Following in Micro INC Trend Micro Apex ONE

CWE-59Link Following3 documents3 sources
Severity
7.8HIGHNVD
EPSS
0.1%
top 82.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 23

Description

An updater link following vulnerability in the Trend Micro Apex One agent could allow a local attacker to abuse the updater to delete an arbitrary folder, leading for a local privilege escalation on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

NVDtrendmicro/apex_one< 14.0.12849+1
CVEListV5trend_micro_inc/trend_micro_apex_one2019 (14.0)14.0.0.12534

🔴Vulnerability Details

2
GHSA
GHSA-9gjc-h498-ff34: An updater link following vulnerability in the Trend Micro Apex One agent could allow a local attacker to abuse the updater to delete an arbitrary fol2024-01-23
CVEList
CVE-2023-52094: An updater link following vulnerability in the Trend Micro Apex One agent could allow a local attacker to abuse the updater to delete an arbitrary fol2024-01-23
CVE-2023-52094 — Link Following | cvebase