Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-56768 | An updater link following vulnerability in the Trend Micro Apex One agent could allow a local attacker to abuse the updater to delete an arbitrary folder, leading for a local privilege escalation on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. |
Fri, 20 Jun 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: trendmicro
Published:
Updated: 2025-06-20T18:56:24.284Z
Reserved: 2023-12-26T18:39:33.449Z
Link: CVE-2023-52094
Updated: 2024-08-02T22:48:12.527Z
Status : Modified
Published: 2024-01-23T21:15:09.293
Modified: 2025-06-20T19:15:27.507
Link: CVE-2023-52094
No data.
OpenCVE Enrichment
No data.
EUVD