A link following vulnerability in Trend Micro Deep Security 20.x agents below build 20.0.1-3180 could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-36027 A link following vulnerability in Trend Micro Deep Security 20.x agents below build 20.0.1-3180 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00111}

epss

{'score': 0.00128}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00041}

epss

{'score': 0.00111}


Thu, 13 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Trendmicro
Trendmicro deep Security Agent
Weaknesses CWE-1106
CPEs cpe:2.3:a:trendmicro:deep_security_agent:20.0:*:*:*:*:*:*:*
Vendors & Products Trendmicro
Trendmicro deep Security Agent
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: trendmicro

Published:

Updated: 2025-03-13T13:55:36.802Z

Reserved: 2024-05-23T20:03:45.563Z

Link: CVE-2024-36358

cve-icon Vulnrichment

Updated: 2024-08-02T03:37:05.280Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-10T22:15:11.230

Modified: 2025-03-13T14:15:26.933

Link: CVE-2024-36358

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.