CVE-2023-25147

An issue in the Trend Micro Apex One agent could allow an attacker who has previously acquired administrative rights via other means to bypass the protection by using a specifically crafted DLL during a specific update process. Please note: an attacker must first obtain administrative access on the target system via another method in order to exploit this.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:trendmicro:apex_one:*:*:*:*:saas:*:*:*
cpe:2.3:a:trendmicro:apex_one:2019:-:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:49

Type Values Removed Values Added
References () https://success.trendmicro.com/solution/000292209 - Vendor Advisory () https://success.trendmicro.com/solution/000292209 - Vendor Advisory

07 Nov 2023, 04:08

Type Values Removed Values Added
Summary An issue in the Trend Micro Apex One agent could allow an attacker who has previously acquired administrative rights via other means to bypass the protection by using a specifically crafted DLL during a specific update process. Please note: an attacker must first obtain administrative access on the target system via another method in order to exploit this. An issue in the Trend Micro Apex One agent could allow an attacker who has previously acquired administrative rights via other means to bypass the protection by using a specifically crafted DLL during a specific update process. Please note: an attacker must first obtain administrative access on the target system via another method in order to exploit this.

Information

Published : 2023-03-10 21:15

Updated : 2025-03-05 21:15


NVD link : CVE-2023-25147

Mitre link : CVE-2023-25147

CVE.ORG link : CVE-2023-25147


JSON object : View

Products Affected

microsoft

  • windows

trendmicro

  • apex_one
CWE
CWE-427

Uncontrolled Search Path Element