A security agent manual scan command injection vulnerability in the Trend Micro Deep Security 20 Agent could allow an attacker to escalate privileges and execute arbitrary code on an affected machine. In certain circumstances, attackers that have legitimate access to the domain may be able to remotely inject commands to other machines in the same domain.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability locally and must have domain user privileges to affect other machines.
Metrics
Affected Vendors & Products
References
History
Tue, 19 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 19 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A security agent manual scan command injection vulnerability in the Trend Micro Deep Security 20 Agent could allow an attacker to escalate privileges and execute arbitrary code on an affected machine. In certain circumstances, attackers that have legitimate access to the domain may be able to remotely inject commands to other machines in the same domain. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability locally and must have domain user privileges to affect other machines. | |
First Time appeared |
Trendmicro
Trendmicro deep Security Agent |
|
Weaknesses | CWE-78 | |
CPEs | cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5995:*:*:long_term_support:*:*:* | |
Vendors & Products |
Trendmicro
Trendmicro deep Security Agent |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: trendmicro
Published: 2024-11-19T19:00:51.467Z
Updated: 2024-11-21T04:55:15.526Z
Reserved: 2024-10-28T17:36:11.711Z
Link: CVE-2024-51503
Vulnrichment
Updated: 2024-11-19T19:29:59.418Z
NVD
Status : Awaiting Analysis
Published: 2024-11-19T19:15:08.470
Modified: 2024-11-19T21:56:45.533
Link: CVE-2024-51503
Redhat
No data.