www.cybersecurity-help.cz
Open in
urlscan Pro
62.210.13.228
Public Scan
URL:
https://www.cybersecurity-help.cz/vdb/SB2022011942
Submission: On January 20 via api from US — Scanned from FR
Submission: On January 20 via api from US — Scanned from FR
Form analysis
1 forms found in the DOMGET /vdb/list.php
<form action="/vdb/list.php" method="GET">
<input type="hidden" name="search_line" value="Y">
<div id="custom-search-input">
<div class="input-group col-md-12">
<input type="text" class="form-control input-sm" name="filter[%SEARCH]" value="" placeholder="Search vulnerability database">
<span class="input-group-btn">
<button class="btn btn-sm" type="submit">
<i class="glyphicon glyphicon-search"></i>
</button>
</span>
</div>
</div>
<br>
<div class="form-group">
<div class="kt-checkbox-inline col-lg-2 col-xl-2">
<label class="kt-checkbox">
<input type="checkbox" class="flat" name="filter[EXPLOIT]" value="Y"> With exploit <span></span>
</label>
</div>
<div class="kt-checkbox-inline col-lg-2 col-xl-2">
<label class="kt-checkbox">
<input type="checkbox" class="flat" name="filter[PATCH]" value="Y"> With patch <span></span>
</label>
</div>
</div>
</form>
Text Content
Register Login Toggle navigation * SaaS Solutions * Vulnerability Intelligence * Pricing * Vulnerabilities * Reports * Blog * Contact Us * Career 1. Main 2. Vulnerability Database With exploit With patch MULTIPLE VULNERABILITIES IN TREND MICRO DEEP SECURITY AGENT Published: 2022-01-19 * * * * * * * Risk Low Patch available YES Number of vulnerabilities 2 CVE-ID CVE-2022-23119 CVE-2022-23120 CWE-ID CWE-22 CWE-94 Exploitation vector Local Public exploit N/A Vulnerable software Subscribe Deep Security Client/Desktop applications / Software for system administration Vendor Trend Micro SECURITY BULLETIN This security bulletin contains information about 2 vulnerabilities. 1) PATH TRAVERSAL EUVDB-ID: #VU59841 Risk: Low CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] CVE-ID: CVE-2022-23119 CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Exploit availability: No Description The vulnerability allows a local user to escalate privileges on the system. The vulnerability exists due to input validation error when processing directory traversal sequences. A local user with access to Deep Security Manager (DSM) prior to agent activation can create a specially crafted file and execute arbitrary code on the system with elevated privileges. Mitigation Install update from vendor's website. Vulnerable software versions Deep Security: 10.0, 10.0 U1, 10.0 U2, 10.0 U3, 10.0 U4, 10.0 U5, 10.0 U6, 10.0 U7, 10.0 U8, 10.0 U9, 10.0 U10, 10.0 U11, 10.0 U12, 10.0 U13, 10.0 U14, 10.0 U15, 10.0 U16, 10.0 U17, 10.0 U18, 10.0 U19, 10.0 U20, 10.0 U21, 10.0 U22, 10.0 U23, 10.0 U24, 10.0 U25, 10.0 U26, 10.0 U27, 10.0 U28, 10.0 U29, 10.0 U30, 10.0 U31, 10.1 (Feature Release), 11.0, 11.0 U1, 11.0 U2, 11.0 U3, 11.0 U4, 11.0 U5, 11.0 U6, 11.0 U7, 11.0 U8, 11.0 U9, 11.0 U10, 11.0 U11, 11.0 U12, 11.0 U13, 11.0 U14, 11.0 U15, 11.0 U16, 11.0 U17, 11.0 U18, 11.0 U19, 11.0 U20, 11.0 U21, 11.0 U22, 11.0 U23, 11.0 U24, 11.0 U25, 11.0 U26, 11.0 U27, 12.0, 12.0 U1, 12.0 U2, 12.0 U3, 12.0 U4, 12.0 U5, 12.0 U6, 12.0 U7, 12.0 U8, 12.0 U9, 12.0 U10, 12.0 U11, 12.0 U12, 12.0 U13, 12.0 U14, 12.0 U15, 12.0 U16, 12.0 U17, 12.0 U18, 12.0 U19, 12.0 U20, 12.0 U21, 20.0 LTS CPE2.3 * cpe:2.3:a:trend_micro:deep_security:20.0 LTS:*:*:*:*:*:*:* * Full software list in CPE2.3 format available after registration. External links http://success.trendmicro.com/solution/000290104 Q & A Can this vulnerability be exploited remotely? No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system. Is there known malware, which exploits this vulnerability? No. We are not aware of malware exploiting this vulnerability. 2) CODE INJECTION EUVDB-ID: #VU59842 Risk: Low CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] CVE-ID: CVE-2022-23120 CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection') Exploit availability: No Description The vulnerability allows a local user to escalate privileges on the system. The vulnerability exists due to input validation error when processing directory traversal sequences. A local user with access to Deep Security Manager (DSM) prior to agent activation can execute arbitrary code with elevated privileges. Mitigation Install updates from vendor's website. Vulnerable software versions Deep Security: 10.0, 10.0 U1, 10.0 U2, 10.0 U3, 10.0 U4, 10.0 U5, 10.0 U6, 10.0 U7, 10.0 U8, 10.0 U9, 10.0 U10, 10.0 U11, 10.0 U12, 10.0 U13, 10.0 U14, 10.0 U15, 10.0 U16, 10.0 U17, 10.0 U18, 10.0 U19, 10.0 U20, 10.0 U21, 10.0 U22, 10.0 U23, 10.0 U24, 10.0 U25, 10.0 U26, 10.0 U27, 10.0 U28, 10.0 U29, 10.0 U30, 10.0 U31, 10.1 (Feature Release), 11.0, 11.0 U1, 11.0 U2, 11.0 U3, 11.0 U4, 11.0 U5, 11.0 U6, 11.0 U7, 11.0 U8, 11.0 U9, 11.0 U10, 11.0 U11, 11.0 U12, 11.0 U13, 11.0 U14, 11.0 U15, 11.0 U16, 11.0 U17, 11.0 U18, 11.0 U19, 11.0 U20, 11.0 U21, 11.0 U22, 11.0 U23, 11.0 U24, 11.0 U25, 11.0 U26, 11.0 U27, 12.0, 12.0 U1, 12.0 U2, 12.0 U3, 12.0 U4, 12.0 U5, 12.0 U6, 12.0 U7, 12.0 U8, 12.0 U9, 12.0 U10, 12.0 U11, 12.0 U12, 12.0 U13, 12.0 U14, 12.0 U15, 12.0 U16, 12.0 U17, 12.0 U18, 12.0 U19, 12.0 U20, 12.0 U21, 20.0 LTS CPE2.3 * cpe:2.3:a:trend_micro:deep_security:20.0 LTS:*:*:*:*:*:*:* * Full software list in CPE2.3 format available after registration. External links http://success.trendmicro.com/solution/000290104 Q & A Can this vulnerability be exploited remotely? No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system. Is there known malware, which exploits this vulnerability? No. We are not aware of malware exploiting this vulnerability. Please enable JavaScript to view the comments powered by Disqus. ###SIDEBAR### STAY CONNECTED * * * * SECURITY SERVICES * Actionable & Personalized Vulnerability Intelligence * On-Demand Security Consulting * Pricing IT-CONSULTING * IT Infrastructure Outsourcing Services * Web Applications Support & Deployment * On-Demand Consulting PARTNER LINKS * SSL/TLS Security Test by ImmuniWeb * Web Server Security Test by ImmuniWeb BLOG * The story of the four bears: Brief analysis of APT groups linked to the Russian government * Cybersecurity year in review: Most notable APT hacks of 2021 * Hackers put up for sale data of 2M ONUS customers after the company refused to pay $5 million ransom * China-based cyber spies breached an academic institution through Log4j flaw * AvosLocker ransomware group provides decryptor for free after learning they hit U.S. police department * Read all articles → Contacts | Terms of use | Privacy Policy © 2022 Cybersecurity Help s.r.o. This website is using cookies. We use them to give you the best experience. If you continue using our website, we'll assume that you are happy to receive all cookies on this website. ContinueLearn more x