CVE-2022-48191

A vulnerability exists in Trend Micro Maximum Security 2022 (17.7) wherein a low-privileged user can write a known malicious executable to a specific location and in the process of removal and restoral an attacker could replace an original folder with a mount point to an arbitrary location, allowing a escalation of privileges on an affected system.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:trendmicro:maximum_security_2022:17.7:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

03 Apr 2025, 20:15

Type Values Removed Values Added
References (MISC) https://helpcenter.trendmicro.com/en-us/article/tmka-11252 - Patch, Vendor Advisory () https://helpcenter.trendmicro.com/en-us/article/tmka-11252 - Patch, Vendor Advisory
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-23-053/ - Patch, Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-23-053/ - Patch, Third Party Advisory, VDB Entry

Information

Published : 2023-01-20 07:15

Updated : 2025-04-03 20:15


NVD link : CVE-2022-48191

Mitre link : CVE-2022-48191


JSON object : View

Products Affected

microsoft

  • windows

trendmicro

  • maximum_security_2022
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition