A LogServer link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. This vulnerability is similar to, but not identical to CVE-2024-52048.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://success.trendmicro.com/en-US/solution/KA-0018217 |
History
Tue, 31 Dec 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 31 Dec 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A LogServer link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. This vulnerability is similar to, but not identical to CVE-2024-52048. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | |
First Time appeared |
Trendmicro
Trendmicro apexone Op Trendmicro apexone Saas |
|
Weaknesses | CWE-266 | |
CPEs | cpe:2.3:a:trendmicro:apexone_op:14.0.0.13121:p3:*:*:*:*:*:* cpe:2.3:a:trendmicro:apexone_saas:14.0.0.14026:ga:*:*:*:*:*:* |
|
Vendors & Products |
Trendmicro
Trendmicro apexone Op Trendmicro apexone Saas |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: trendmicro
Published: 2024-12-31T16:13:12.794Z
Updated: 2024-12-31T19:24:27.242Z
Reserved: 2024-11-05T15:05:29.658Z
Link: CVE-2024-52049
Vulnrichment
Updated: 2024-12-31T19:24:22.305Z
NVD
Status : Received
Published: 2024-12-31T16:15:26.193
Modified: 2024-12-31T16:15:26.193
Link: CVE-2024-52049
Redhat
No data.