CVE-2022-44654
HIGH
7,5
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high
Description
AI Translation Available
Affected builds of Trend Micro Apex One and Apex One as a Service contain a monitor engine component that is complied without the /SAFESEH memory protection mechanism which helps to monitor for malicious payloads. The affected component's memory protection mechanism has been updated to enhance product security.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0057
Percentile
0,7th
Updated
EPSS Score Trend (Last 91 Days)
122
Heap-based Buffer Overflow
DraftCommon Consequences
Security Scopes Affected:
Availability
Integrity
Confidentiality
Access Control
Other
Potential Impacts:
Dos: Crash, Exit, Or Restart
Dos: Resource Consumption (Cpu)
Dos: Resource Consumption (Memory)
Execute Unauthorized Code Or Commands
Bypass Protection Mechanism
Modify Memory
Other
Applicable Platforms
Languages:
C, C++, Memory-Unsafe
Application
Apex One by Trendmicro
CPE Identifier
View Detailed Analysis
cpe:2.3:a:trendmicro:apex_one:2019:-:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Apex One by Trendmicro
Version Range Affected
To
14.0.11789
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:trendmicro:apex_one:*:*:*:*:saas:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://success.trendmicro.com/solution/000291770
https://success.trendmicro.com/solution/000291770