Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:a:trendmicro:apex_one:14.0.10349:*:*:*:saas:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-25148 |
A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to exploit the vulnerability by changing a specific file into a pseudo-symlink, allowing privilege escalation on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Published: March 10, 2023; 4:15:15 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-25147 |
An issue in the Trend Micro Apex One agent could allow an attacker who has previously acquired administrative rights via other means to bypass the protection by using a specifically crafted DLL during a specific update process. Please note: an attacker must first obtain administrative access on the target system via another method in order to exploit this. Published: March 10, 2023; 4:15:15 PM -0500 |
V3.1: 6.7 MEDIUM V2.0:(not available) |
CVE-2023-25146 |
A security agent link following vulnerability in the Trend Micro Apex One agent could allow a local attacker to quarantine a file, delete the original folder and replace with a junction to an arbitrary location, ultimately leading to an arbitrary file dropped to an arbitrary location. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Published: March 10, 2023; 4:15:15 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-25145 |
A link following vulnerability in the scanning function of Trend Micro Apex One agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Published: March 10, 2023; 4:15:15 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-25144 |
An improper access control vulnerability in the Trend Micro Apex One agent could allow a local attacker to gain elevated privileges and create arbitrary directories with arbitrary ownership. Published: March 10, 2023; 4:15:14 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-25143 |
An uncontrolled search path element vulnerability in the Trend Micro Apex One Server installer could allow an attacker to achieve a remote code execution state on affected products. Published: March 10, 2023; 4:15:14 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2022-44654 |
Affected builds of Trend Micro Apex One and Apex One as a Service contain a monitor engine component that is complied without the /SAFESEH memory protection mechanism which helps to monitor for malicious payloads. The affected component's memory protection mechanism has been updated to enhance product security. Published: December 12, 2022; 8:15:15 AM -0500 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-44653 |
A security agent directory traversal vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Published: December 12, 2022; 8:15:15 AM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-44652 |
An improper handling of exceptional conditions vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Published: December 12, 2022; 8:15:15 AM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-44651 |
A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Published: December 12, 2022; 8:15:15 AM -0500 |
V3.1: 7.0 HIGH V2.0:(not available) |
CVE-2022-44650 |
A memory corruption vulnerability in the Unauthorized Change Prevention service of Trend Micro Apex One and Apex One as a Service could allow a local attacker to elevate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Published: December 12, 2022; 8:15:15 AM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-44649 |
An out-of-bounds access vulnerability in the Unauthorized Change Prevention service of Trend Micro Apex One and Apex One as a Service could allow a local attacker to elevate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Published: December 12, 2022; 8:15:15 AM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-44648 |
An Out-of-bounds read vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not the same as CVE-2022-44647. Published: December 12, 2022; 8:15:15 AM -0500 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2022-44647 |
An Out-of-bounds read vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not the same as CVE-2022-44648. Published: December 12, 2022; 8:15:15 AM -0500 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2019-18189 |
A directory traversal vulnerability in Trend Micro Apex One, OfficeScan (11.0, XG) and Worry-Free Business Security (9.5, 10.0) may allow an attacker to bypass authentication and log on to an affected product's management console as a root user. The vulnerability does not require authentication. Published: October 28, 2019; 4:15:11 PM -0400 |
V3.1: 9.8 CRITICAL V2.0: 10.0 HIGH |
CVE-2019-9489 |
A directory traversal vulnerability in Trend Micro Apex One, OfficeScan (versions XG and 11.0), and Worry-Free Business Security (versions 10.0, 9.5 and 9.0) could allow an attacker to modify arbitrary files on the affected product's management console. Published: April 05, 2019; 7:29:00 PM -0400 |
V3.0: 7.5 HIGH V2.0: 5.0 MEDIUM |