Link Following Privilege Escalation in Trend Micro Password Manager
CVE-2022-30523

7.8HIGH

Key Information:

Vendor
CVE Published:
16 May 2022

Summary

The Trend Micro Password Manager, specifically versions up to 5.0.0.1266, suffers from a Link Following Privilege Escalation vulnerability. This flaw allows a local attacker with low privileges to exploit the software and gain SYSTEM-level access to delete the contents of an arbitrary folder. This capability could potentially lead to further privilege escalation on the affected machine, providing attackers with elevated permissions and access to sensitive information. Users of affected versions are advised to apply necessary security patches and updates available from Trend Micro.

Affected Version(s)

Trend Micro Password Manager 5.0.0.1266 and below

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.