CVE ID | CVE-2024-41183 |
CVSS SCORE | 7.0, AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
AFFECTED VENDORS |
Trend Micro |
AFFECTED PRODUCTS |
VPN Proxy One Pro |
VULNERABILITY DETAILS |
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro VPN Proxy One Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the VpnBackgroundController executable. By creating a symbolic link, an attacker can abuse the application to move arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. |
ADDITIONAL DETAILS |
Trend Micro has issued an update to correct this vulnerability. More details can be found at:
https://helpcenter.trendmicro.com/en-us/article/tmka-14460 |
DISCLOSURE TIMELINE |
|
CREDIT | Hashim Jawad (@ihack4falafel) |