Release Date: May 10, 2022
CVE Vulnerability Identifier: CVE-2022-30523
Platform(s): Microsoft Windows
Severity Rating: High
Trend Micro has released a new version of the Trend Micro Password Manager for Windows family of consumer products which resolves a Link Following Privilege Escalation Vulnerability.
|Trend Micro Password Manager||188.8.131.526 and below||Microsoft Windows||English|
|Trend Micro Password Manager||184.108.40.2060||Microsoft Windows||English|
Trend Micro has released an update via the product’s automatic update mechanism to resolve this issue. Your Trend Micro Password Manager program should receive the update automatically as long as your computer is connected to the Internet. Customers are advised to use the latest version when doing a fresh installation of the product.
Trend Micro Password Manager (Consumer) version 220.127.116.116 and below is vulnerable to a Link Following Privilege Escalation Vulnerability that could allow a low privileged local attacker to delete the contents of an arbitrary folder as SYSTEM which can then be used for privilege escalation on the affected machine.
Trend Micro has received no reports nor is aware of any actual attacks against the affected product related to this vulnerability at this time.
Trend Micro would like to thank the following individual for responsibly disclosing the issue and working with Trend Micro to help protect our customers:
- @Kharosx0 working with Trend Micro Zero Day Initiative (ZDI)
Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.
The following advisories may be found at Trend Micro's Zero Day Initiative Published Advisories site: