Link Following Privilege Escalation in Trend Micro Password Manager
CVE-2022-30523
7.8HIGH
Summary
The Trend Micro Password Manager, specifically versions up to 5.0.0.1266, suffers from a Link Following Privilege Escalation vulnerability. This flaw allows a local attacker with low privileges to exploit the software and gain SYSTEM-level access to delete the contents of an arbitrary folder. This capability could potentially lead to further privilege escalation on the affected machine, providing attackers with elevated permissions and access to sensitive information. Users of affected versions are advised to apply necessary security patches and updates available from Trend Micro.
Affected Version(s)
Trend Micro Password Manager 5.0.0.1266 and below
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved