Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2022-35234 CVE-2022-37347 CVE-2022-37348 |
CWE-ID | CWE-125 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Trend Micro Security (Consumer) Client/Desktop applications / Software for system administration Maximum Security Client/Desktop applications / Antivirus software/Personal firewalls |
Vendor | Trend Micro |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU65018
Risk: Low
CVSSv3.1: 3.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-35234
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the User Mode Hooking Monitor Engine. A local user can trigger an out-of-bounds read error and read contents of memory on the system or cause the application.
MitigationInstall updates from vendor's website.
Vulnerable software versionsTrend Micro Security (Consumer): 17.7.1130 - 17.7.1383
Maximum Security: 2021 (v17) - 2022 v17.7
External linkshttp://helpcenter.trendmicro.com/en-us/article/TMKA-11058
http://www.zerodayinitiative.com/advisories/ZDI-22-962/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66907
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-37347
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the User Mode Hooking Monitor Engine. A local user can pass specially crafted input to the application and read contents of memory on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMaximum Security: 2021 (v17) - 2022 v17.7
Trend Micro Security (Consumer): 17.7 - 17.7.1383
External linkshttp://www.zerodayinitiative.com/advisories/ZDI-22-1176/
http://helpcenter.trendmicro.com/en-us/article/tmka-11058
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66905
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-37348
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the User Mode Hooking Monitor Engine. A local user can pass specially crafted input to the application and read contents of memory on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMaximum Security: 2021 (v17) - 2022 v17.7
Trend Micro Security (Consumer): 17.7 - 17.7.1383
External linkshttp://www.zerodayinitiative.com/advisories/ZDI-22-1177/
http://helpcenter.trendmicro.com/en-us/article/tmka-11058
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.