Trendmicro Deep Security Agent vulnerabilities
15 known vulnerabilities affecting trendmicro/deep_security_agent.
Total CVEs
15
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH11MEDIUM1LOW3
Vulnerabilities
Page 1 of 1
CVE-2025-30640HIGHCVSS 7.8fixed in 20.0.1v20.0.12025-06-17
CVE-2025-30640 [HIGH] CWE-59 CVE-2025-30640: A link following vulnerability in Trend Micro Deep Security 20.0 agents could allow a local attacker
A link following vulnerability in Trend Micro Deep Security 20.0 agents could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
nvd
CVE-2025-30641HIGHCVSS 7.8fixed in 20.0.1v20.0.12025-06-17
CVE-2025-30641 [HIGH] CWE-59 CVE-2025-30641: A link following vulnerability in the anti-malware solution portion of Trend Micro Deep Security 20.
A link following vulnerability in the anti-malware solution portion of Trend Micro Deep Security 20.0 agents could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
nvd
CVE-2025-30642MEDIUMCVSS 5.5fixed in 20.0.1v20.0.12025-06-17
CVE-2025-30642 [MEDIUM] CWE-59 CVE-2025-30642: A link following vulnerability in Trend Micro Deep Security 20.0 agents could allow a local attacker
A link following vulnerability in Trend Micro Deep Security 20.0 agents could allow a local attacker to create a denial of service (DoS) situation on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
nvd
CVE-2024-55955HIGHCVSS 7.3v20.0.12024-12-31
CVE-2024-55955 [MEDIUM] CWE-427 CVE-2024-55955: An incorrect permissions assignment vulnerability in Trend Micro Deep Security 20.0 agents between v
An incorrect permissions assignment vulnerability in Trend Micro Deep Security 20.0 agents between versions 20.0.1-9400 and 20.0.1-23340 could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vu
nvd
CVE-2024-51503HIGHCVSS 8.8v20.0v20.0.12024-11-19
CVE-2024-51503 [HIGH] CWE-78 CVE-2024-51503: A security agent manual scan command injection vulnerability in the Trend Micro Deep Security 20 Age
A security agent manual scan command injection vulnerability in the Trend Micro Deep Security 20 Agent could allow an attacker to escalate privileges and execute arbitrary code on an affected machine. In certain circumstances, attackers that have legitimate access to the domain may be able to remotely inject commands to other machines in the same domai
nvd
CVE-2024-48903HIGHCVSS 7.8fixed in 20.0.12024-10-22
CVE-2024-48903 [HIGH] CWE-269 CVE-2024-48903: An improper access control vulnerability in Trend Micro Deep Security Agent 20 could allow a local a
An improper access control vulnerability in Trend Micro Deep Security Agent 20 could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
nvd
CVE-2024-36358HIGHCVSS 7.8v20.0v20.0.12024-06-10
CVE-2024-36358 [HIGH] CWE-1106 CVE-2024-36358: A link following vulnerability in Trend Micro Deep Security 20.x agents below build 20.0.1-3180 coul
A link following vulnerability in Trend Micro Deep Security 20.x agents below build 20.0.1-3180 could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
nvd
CVE-2023-52338HIGHCVSS 7.8v20.02024-01-23
CVE-2023-52338 [HIGH] CWE-59 CVE-2023-52338: A link following vulnerability in the Trend Micro Deep Security 20.0 and Trend Micro Cloud One - End
A link following vulnerability in the Trend Micro Deep Security 20.0 and Trend Micro Cloud One - Endpoint and Workload Security Agent could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerab
nvd
CVE-2023-52337HIGHCVSS 7.8v20.02024-01-23
CVE-2023-52337 [HIGH] CWE-269 CVE-2023-52337: An improper access control vulnerability in Trend Micro Deep Security 20.0 and Trend Micro Cloud One
An improper access control vulnerability in Trend Micro Deep Security 20.0 and Trend Micro Cloud One - Endpoint and Workload Security Agent could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this v
nvd
CVE-2022-40710HIGHCVSS 7.8v20.02022-09-28
CVE-2022-40710 [HIGH] CWE-59 CVE-2022-40710: A link following vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Age
A link following vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
nvd
CVE-2022-40707LOWCVSS 3.3v20.02022-09-28
CVE-2022-40707 [LOW] CWE-125 CVE-2022-40707: An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Securit
An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabili
nvd
CVE-2022-40709LOWCVSS 3.3v20.02022-09-28
CVE-2022-40709 [LOW] CVE-2022-40709: An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Securit
An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. Th
nvd
CVE-2022-40708LOWCVSS 3.3v20.02022-09-28
CVE-2022-40708 [LOW] CVE-2022-40708: An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Securit
An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. Th
nvd
CVE-2022-23120HIGHCVSS 7.8≥ 20.0, < 20.0.0-3445v10.0+2 more2022-01-20
CVE-2022-23120 [HIGH] CWE-94 CVE-2022-23120: A code injection vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent
A code injection vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to escalate privileges and run arbitrary code in the context of root. Please note: an attacker must first obtain access to the target agent in an un-activated and unconfigured state in order to exploi
nvd
CVE-2022-23119HIGHCVSS 7.5≥ 20.0, < 20.0.0-3445v10.0+2 more2022-01-20
CVE-2022-23119 [HIGH] CWE-22 CVE-2022-23119: A directory traversal vulnerability in Trend Micro Deep Security and Cloud One - Workload Security A
A directory traversal vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to read arbitrary files from the file system. Please note: an attacker must first obtain compromised access to the target Deep Security Manager (DSM) or the target agent must be not yet activate
nvd