Trend Micro VPN, version 5.8.1012 and below is vulnerable to an arbitrary file overwrite under specific conditions that can lead to elevation of privileges.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| https://helpcenter.trendmicro.com/en-us/article/tmka-14460 | Vendor Advisory |
| https://www.zerodayinitiative.com/advisories/ZDI-24-1022/ | Third Party Advisory |
| https://www.zerodayinitiative.com/advisories/ZDI-24-1023/ | Third Party Advisory |
Configurations
History
31 Jul 2025, 16:14
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://helpcenter.trendmicro.com/en-us/article/tmka-14460 - Vendor Advisory | |
| References | () https://www.zerodayinitiative.com/advisories/ZDI-24-1023/ - Third Party Advisory | |
| References | () https://www.zerodayinitiative.com/advisories/ZDI-24-1022/ - Third Party Advisory | |
| CPE | cpe:2.3:a:trendmicro:vpn:*:*:*:*:*:windows:*:* | |
| First Time |
Trendmicro
Trendmicro vpn |
22 Oct 2024, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-10-22 19:15
Updated : 2025-07-31 16:14
NVD link : CVE-2024-41183
Mitre link : CVE-2024-41183
JSON object : View
Products Affected
trendmicro
- vpn
CWE
No CWE.
