A LogServer link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. This vulnerability is similar to, but not identical to CVE-2024-52049.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://success.trendmicro.com/en-US/solution/KA-0018217 |
History
Tue, 31 Dec 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 31 Dec 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A LogServer link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. This vulnerability is similar to, but not identical to CVE-2024-52049. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | |
First Time appeared |
Trendmicro
Trendmicro apexone Op Trendmicro apexone Saas |
|
Weaknesses | CWE-266 | |
CPEs | cpe:2.3:a:trendmicro:apexone_op:14.0.0.13121:p3:*:*:*:*:*:* cpe:2.3:a:trendmicro:apexone_saas:14.0.0.14026:ga:*:*:*:*:*:* |
|
Vendors & Products |
Trendmicro
Trendmicro apexone Op Trendmicro apexone Saas |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: trendmicro
Published: 2024-12-31T16:11:41.737Z
Updated: 2024-12-31T19:27:31.262Z
Reserved: 2024-11-05T15:05:29.658Z
Link: CVE-2024-52048
Vulnrichment
Updated: 2024-12-31T19:27:27.153Z
NVD
Status : Received
Published: 2024-12-31T16:15:26.063
Modified: 2024-12-31T16:15:26.063
Link: CVE-2024-52048
Redhat
No data.