CVE Vulnerabilities

CVE-2022-40710

Improper Link Resolution Before File Access ('Link Following')

Published: Sep 28, 2022 | Modified: Feb 27, 2024
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A link following vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
Deep_security_agent Trendmicro 20.0 (including) 20.0 (including)
Deep_security_agent Trendmicro 20.0-update1337 (including) 20.0-update1337 (including)
Deep_security_agent Trendmicro 20.0-update1559 (including) 20.0-update1559 (including)
Deep_security_agent Trendmicro 20.0-update158 (including) 20.0-update158 (including)
Deep_security_agent Trendmicro 20.0-update167 (including) 20.0-update167 (including)
Deep_security_agent Trendmicro 20.0-update1681 (including) 20.0-update1681 (including)
Deep_security_agent Trendmicro 20.0-update173 (including) 20.0-update173 (including)
Deep_security_agent Trendmicro 20.0-update180 (including) 20.0-update180 (including)
Deep_security_agent Trendmicro 20.0-update182 (including) 20.0-update182 (including)
Deep_security_agent Trendmicro 20.0-update1822 (including) 20.0-update1822 (including)
Deep_security_agent Trendmicro 20.0-update183 (including) 20.0-update183 (including)
Deep_security_agent Trendmicro 20.0-update1876 (including) 20.0-update1876 (including)
Deep_security_agent Trendmicro 20.0-update190 (including) 20.0-update190 (including)
Deep_security_agent Trendmicro 20.0-update198 (including) 20.0-update198 (including)
Deep_security_agent Trendmicro 20.0-update2009 (including) 20.0-update2009 (including)
Deep_security_agent Trendmicro 20.0-update208 (including) 20.0-update208 (including)
Deep_security_agent Trendmicro 20.0-update213 (including) 20.0-update213 (including)
Deep_security_agent Trendmicro 20.0-update2204 (including) 20.0-update2204 (including)
Deep_security_agent Trendmicro 20.0-update223 (including) 20.0-update223 (including)
Deep_security_agent Trendmicro 20.0-update224 (including) 20.0-update224 (including)
Deep_security_agent Trendmicro 20.0-update2419 (including) 20.0-update2419 (including)
Deep_security_agent Trendmicro 20.0-update2593 (including) 20.0-update2593 (including)
Deep_security_agent Trendmicro 20.0-update2740 (including) 20.0-update2740 (including)
Deep_security_agent Trendmicro 20.0-update2921 (including) 20.0-update2921 (including)
Deep_security_agent Trendmicro 20.0-update3165 (including) 20.0-update3165 (including)
Deep_security_agent Trendmicro 20.0-update3288 (including) 20.0-update3288 (including)
Deep_security_agent Trendmicro 20.0-update3445 (including) 20.0-update3445 (including)
Deep_security_agent Trendmicro 20.0-update3530 (including) 20.0-update3530 (including)
Deep_security_agent Trendmicro 20.0-update3771 (including) 20.0-update3771 (including)
Deep_security_agent Trendmicro 20.0-update3964 (including) 20.0-update3964 (including)
Deep_security_agent Trendmicro 20.0-update4185 (including) 20.0-update4185 (including)
Deep_security_agent Trendmicro 20.0-update4416 (including) 20.0-update4416 (including)
Deep_security_agent Trendmicro 20.0-update4726 (including) 20.0-update4726 (including)
Deep_security_agent Trendmicro 20.0-update4959 (including) 20.0-update4959 (including)
Deep_security_agent Trendmicro 20.0-update5137 (including) 20.0-update5137 (including)
Deep_security_agent Trendmicro 20.0-update877 (including) 20.0-update877 (including)

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References