Description
An installer search patch element vulnerability in Trend Micro Portable Security 3.0 Pro, 3.0 and 2.0 could allow a local attacker to place an arbitrarily generated DLL file in an installer folder to elevate local privileges. Please note: an attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-30880 | An installer search patch element vulnerability in Trend Micro Portable Security 3.0 Pro, 3.0 and 2.0 could allow a local attacker to place an arbitrarily generated DLL file in an installer folder to elevate local privileges. Please note: an attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. |
References
| Link | Providers |
|---|---|
| https://success.trendmicro.com/solution/000290531 |
|
History
No history.
Status: PUBLISHED
Assigner: trendmicro
Published:
Updated: 2024-08-03T05:03:32.227Z
Reserved: 2022-02-28T00:00:00.000Z
Link: CVE-2022-26319
No data.
Status : Modified
Published: 2022-03-08T22:15:07.827
Modified: 2024-11-21T06:53:44.863
Link: CVE-2022-26319
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD