Lucene search

K
cve[email protected]CVE-2022-23119
HistoryJan 20, 2022 - 7:15 p.m.

CVE-2022-23119

2022-01-2019:15:07
CWE-22
web.nvd.nist.gov
39
cve-2022-23119
directory traversal
trend micro
deep security
cloud one
workload security
linux
vulnerability
nvd
security agent

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

57.0%

A directory traversal vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to read arbitrary files from the file system. Please note: an attacker must first obtain compromised access to the target Deep Security Manager (DSM) or the target agent must be not yet activated or configured in order to exploit this vulnerability.

Affected configurations

NVD
Node
trendmicrodeep_security_agentRange20.020.0.0-3445long_term_support
OR
trendmicrodeep_security_agentMatch10.0-long_term_support
OR
trendmicrodeep_security_agentMatch10.0update1long_term_support
OR
trendmicrodeep_security_agentMatch10.0update10long_term_support
OR
trendmicrodeep_security_agentMatch10.0update11long_term_support
OR
trendmicrodeep_security_agentMatch10.0update12long_term_support
OR
trendmicrodeep_security_agentMatch10.0update13long_term_support
OR
trendmicrodeep_security_agentMatch10.0update14long_term_support
OR
trendmicrodeep_security_agentMatch10.0update15long_term_support
OR
trendmicrodeep_security_agentMatch10.0update16long_term_support
OR
trendmicrodeep_security_agentMatch10.0update17long_term_support
OR
trendmicrodeep_security_agentMatch10.0update18long_term_support
OR
trendmicrodeep_security_agentMatch10.0update19long_term_support
OR
trendmicrodeep_security_agentMatch10.0update2long_term_support
OR
trendmicrodeep_security_agentMatch10.0update20long_term_support
OR
trendmicrodeep_security_agentMatch10.0update21long_term_support
OR
trendmicrodeep_security_agentMatch10.0update22long_term_support
OR
trendmicrodeep_security_agentMatch10.0update23long_term_support
OR
trendmicrodeep_security_agentMatch10.0update24long_term_support
OR
trendmicrodeep_security_agentMatch10.0update25long_term_support
OR
trendmicrodeep_security_agentMatch10.0update26long_term_support
OR
trendmicrodeep_security_agentMatch10.0update27long_term_support
OR
trendmicrodeep_security_agentMatch10.0update28long_term_support
OR
trendmicrodeep_security_agentMatch10.0update29long_term_support
OR
trendmicrodeep_security_agentMatch10.0update3long_term_support
OR
trendmicrodeep_security_agentMatch10.0update30long_term_support
OR
trendmicrodeep_security_agentMatch10.0update31long_term_support
OR
trendmicrodeep_security_agentMatch10.0update4long_term_support
OR
trendmicrodeep_security_agentMatch10.0update5long_term_support
OR
trendmicrodeep_security_agentMatch10.0update6long_term_support
OR
trendmicrodeep_security_agentMatch10.0update7long_term_support
OR
trendmicrodeep_security_agentMatch10.0update8long_term_support
OR
trendmicrodeep_security_agentMatch10.0update9long_term_support
OR
trendmicrodeep_security_agentMatch11.0-long_term_support
OR
trendmicrodeep_security_agentMatch11.0update1long_term_support
OR
trendmicrodeep_security_agentMatch11.0update10long_term_support
OR
trendmicrodeep_security_agentMatch11.0update11long_term_support
OR
trendmicrodeep_security_agentMatch11.0update12long_term_support
OR
trendmicrodeep_security_agentMatch11.0update13long_term_support
OR
trendmicrodeep_security_agentMatch11.0update14long_term_support
OR
trendmicrodeep_security_agentMatch11.0update15long_term_support
OR
trendmicrodeep_security_agentMatch11.0update16long_term_support
OR
trendmicrodeep_security_agentMatch11.0update17long_term_support
OR
trendmicrodeep_security_agentMatch11.0update18long_term_support
OR
trendmicrodeep_security_agentMatch11.0update19long_term_support
OR
trendmicrodeep_security_agentMatch11.0update2long_term_support
OR
trendmicrodeep_security_agentMatch11.0update20long_term_support
OR
trendmicrodeep_security_agentMatch11.0update21long_term_support
OR
trendmicrodeep_security_agentMatch11.0update22long_term_support
OR
trendmicrodeep_security_agentMatch11.0update23long_term_support
OR
trendmicrodeep_security_agentMatch11.0update24long_term_support
OR
trendmicrodeep_security_agentMatch11.0update25long_term_support
OR
trendmicrodeep_security_agentMatch11.0update26long_term_support
OR
trendmicrodeep_security_agentMatch11.0update27long_term_support
OR
trendmicrodeep_security_agentMatch11.0update3long_term_support
OR
trendmicrodeep_security_agentMatch11.0update4long_term_support
OR
trendmicrodeep_security_agentMatch11.0update5long_term_support
OR
trendmicrodeep_security_agentMatch11.0update6long_term_support
OR
trendmicrodeep_security_agentMatch11.0update7long_term_support
OR
trendmicrodeep_security_agentMatch11.0update8long_term_support
OR
trendmicrodeep_security_agentMatch11.0update9long_term_support
OR
trendmicrodeep_security_agentMatch12.0-long_term_support
OR
trendmicrodeep_security_agentMatch12.0update1long_term_support
OR
trendmicrodeep_security_agentMatch12.0update10long_term_support
OR
trendmicrodeep_security_agentMatch12.0update11long_term_support
OR
trendmicrodeep_security_agentMatch12.0update12long_term_support
OR
trendmicrodeep_security_agentMatch12.0update13long_term_support
OR
trendmicrodeep_security_agentMatch12.0update14long_term_support
OR
trendmicrodeep_security_agentMatch12.0update15long_term_support
OR
trendmicrodeep_security_agentMatch12.0update16long_term_support
OR
trendmicrodeep_security_agentMatch12.0update17long_term_support
OR
trendmicrodeep_security_agentMatch12.0update18long_term_support
OR
trendmicrodeep_security_agentMatch12.0update19long_term_support
OR
trendmicrodeep_security_agentMatch12.0update2long_term_support
OR
trendmicrodeep_security_agentMatch12.0update20long_term_support
OR
trendmicrodeep_security_agentMatch12.0update21long_term_support
OR
trendmicrodeep_security_agentMatch12.0update3long_term_support
OR
trendmicrodeep_security_agentMatch12.0update4long_term_support
OR
trendmicrodeep_security_agentMatch12.0update5long_term_support
OR
trendmicrodeep_security_agentMatch12.0update6long_term_support
OR
trendmicrodeep_security_agentMatch12.0update7long_term_support
OR
trendmicrodeep_security_agentMatch12.0update8long_term_support
OR
trendmicrodeep_security_agentMatch12.0update9long_term_support
AND
linuxlinux_kernelMatch-

CNA Affected

[
  {
    "product": "Trend Micro Deep Security Agent for Linux",
    "vendor": "Trend Micro",
    "versions": [
      {
        "status": "affected",
        "version": "20, 12, 11, 10"
      }
    ]
  }
]

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

57.0%

Related for CVE-2022-23119