ID

VAR-202406-0101


CVE

CVE-2024-32849


TITLE

Trend Micro Maximum Security coreServiceShell Link Following Local Privilege Escalation Vulnerability

Trust: 0.7

sources: ZDI: ZDI-24-576

DESCRIPTION

Trend Micro Security 17.x (Consumer) is vulnerable to a Privilege Escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the coreServiceShell. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM

Trust: 1.53

sources: NVD: CVE-2024-32849 // ZDI: ZDI-24-576

AFFECTED PRODUCTS

vendor:trend micromodel:maximum securityscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-24-576

CVSS

SEVERITY

CVSSV2

CVSSV3

security@trendmicro.com: CVE-2024-32849
value: HIGH

Trust: 1.0

ZDI: CVE-2024-32849
value: HIGH

Trust: 0.7

security@trendmicro.com: CVE-2024-32849
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ZDI: CVE-2024-32849
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-24-576 // NVD: CVE-2024-32849

PROBLEMTYPE DATA

problemtype:CWE-269

Trust: 1.0

sources: NVD: CVE-2024-32849

PATCH

title:Trend Micro has issued an update to correct this vulnerability.url:https://helpcenter.trendmicro.com/en-us/article/tmka-19175

Trust: 0.7

sources: ZDI: ZDI-24-576

EXTERNAL IDS

db:NVDid:CVE-2024-32849

Trust: 1.7

db:ZDIid:ZDI-24-576

Trust: 1.7

db:ZDI_CANid:ZDI-CAN-22269

Trust: 0.7

sources: ZDI: ZDI-24-576 // NVD: CVE-2024-32849

REFERENCES

url:https://helpcenter.trendmicro.com/en-us/article/tmka-19175

Trust: 1.7

url:https://www.zerodayinitiative.com/advisories/zdi-24-576/

Trust: 1.0

sources: ZDI: ZDI-24-576 // NVD: CVE-2024-32849

CREDITS

Nicholas Zubrisky and Michael DePlante (@izobashi) of Trend Micro's Zero Day Initiative

Trust: 0.7

sources: ZDI: ZDI-24-576

SOURCES

db:ZDIid:ZDI-24-576
db:NVDid:CVE-2024-32849

LAST UPDATE DATE

2024-08-14T15:41:12.700000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-24-576date:2024-07-01T00:00:00
db:NVDid:CVE-2024-32849date:2024-07-03T01:57:09.160

SOURCES RELEASE DATE

db:ZDIid:ZDI-24-576date:2024-06-06T00:00:00
db:NVDid:CVE-2024-32849date:2024-06-10T22:15:09.453