A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://success.trendmicro.com/en-US/solution/KA-0018217 |
History
Tue, 31 Dec 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 31 Dec 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | |
First Time appeared |
Trendmicro
Trendmicro apexone Op Trendmicro apexone Saas |
|
Weaknesses | CWE-269 | |
CPEs | cpe:2.3:a:trendmicro:apexone_op:14.0.0.13121:p3:*:*:*:*:*:* cpe:2.3:a:trendmicro:apexone_saas:14.0.0.14026:ga:*:*:*:*:*:* |
|
Vendors & Products |
Trendmicro
Trendmicro apexone Op Trendmicro apexone Saas |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: trendmicro
Published: 2024-12-31T16:16:01.207Z
Updated: 2024-12-31T17:25:15.416Z
Reserved: 2024-12-09T19:34:03.498Z
Link: CVE-2024-55632
Vulnrichment
Updated: 2024-12-31T17:25:12.369Z
NVD
Status : Received
Published: 2024-12-31T17:15:09.007
Modified: 2024-12-31T17:15:09.007
Link: CVE-2024-55632
Redhat
No data.