A memory corruption vulnerability in the Unauthorized Change Prevention service of Trend Micro Apex One and Apex One as a Service could allow a local attacker to elevate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://success.trendmicro.com/solution/000291770 | vendor advisory |
https://www.zerodayinitiative.com/advisories/ZDI-22-1616/ | vdb entry third party advisory |