This vulnerability allows remote malicious users to escalate privileges on affected installations of Trend Micro TXOne StellarOne. Authentication is required to exploit this vulnerability. The specific flaw exists within the Account endpoint. The issue results from the lack of proper access control. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
trendmicro txone_stellarone |