[Japanese]
|
JVNDB-2022-002295
|
Multiple vulnerabilities in Trend Micro Security
|
Trend Micro Incorporated has released security updates for Trend Micro Security.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.
|
CVSS V3 Severity: Base Metrics 7.8 (High) [NVD Score]
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
The above CVSS base scores have been assigned for CVE-2022-30703
|
CVSS V3 Severity:
Base Metrics:5.5 (Medium) [Other]
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
The above CVSS base scores have been assigned for CVE-2022-30702
|
|
Trend Micro, Inc.
- Trend Micro Security 2022
- Trend Micro Security 2021
|
|
Trend Micro Security 2022
* Information disclosure due to an Out-Of-Bounds Read vulnerability
* Information disclosure and privilege escalation due to an exposed dangerous method vulnerability
Trend Micro Security 2021
* Information disclosure and privilege escalation due to an exposed dangerous method vulnerability
|
[Update the software]
Update the software to the latest version according to the information provided by the developer.
The update that addresses this vulnerability is available and is automatically applied through the product's ActiveUpdate feature.
|
Trend Micro, Inc.
|
- Out-of-bounds Read(CWE-125) [NVD Evaluation]
- No Mapping(CWE-noinfo) [NVD Evaluation]
|
- CVE-2022-30702
- CVE-2022-30703
|
- JVN : JVNVU#93109244
- National Vulnerability Database (NVD) : CVE-2022-30702
- National Vulnerability Database (NVD) : CVE-2022-30703
|
- [2022/08/19]
Web page was published
|