4.3
CVSSv2

CVE-2022-23119

Published: 20/01/2022 Updated: 27/01/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

A directory traversal vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an malicious user to read arbitrary files from the file system. Please note: an attacker must first obtain compromised access to the target Deep Security Manager (DSM) or the target agent must be not yet activated or configured in order to exploit this vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

trendmicro deep_security_agent 10.0

trendmicro deep_security_agent 11.0

trendmicro deep_security_agent 12.0

trendmicro deep_security_agent

Github Repositories

Critical Vulnerabilities in Trend Micro Deep Security Agent for Linux

PoC Trend Micro Deep Security Agent (CVE-2022-23119, CVE-2022-23120) This repository contains proof of concept (PoC) bash scripts to perform the attacks described in MZ-21-02 PoC Arbitrary File Read / Directory Traversal Download Deep Security Agent 2000-2740 for Ubuntu_2004-x86_64 (20 LTS Update 2021-07-29) Verify SHA256 checksum: 183ea8a2240028aa9cfedd3f3733c9ff61aa108d8