Vulnerability Description
A link following privilege escalation vulnerability in Trend Micro Apex One (on-prem and SaaS) and Trend Micro Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to create a specially crafted file with arbitrary content which could grant local privilege escalation on the affected system. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trendmicro | Apex One | 2019 |
| Trendmicro | Worry-Free Business Security | 10.0 |
| Trendmicro | Worry-Free Business Security Services | - |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- https://success.trendmicro.com/solution/000289996PatchVendor Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-22-013/Third Party AdvisoryVDB Entry
- https://success.trendmicro.com/solution/000289996PatchVendor Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-22-013/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2021-45231?
CVE-2021-45231 is a vulnerability with a CVSS score of 7.8 (HIGH). A link following privilege escalation vulnerability in Trend Micro Apex One (on-prem and SaaS) and Trend Micro Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to crea...
How severe is CVE-2021-45231?
CVE-2021-45231 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-45231?
Check the references section above for vendor advisories and patch information. Affected products include: Trendmicro Apex One, Trendmicro Worry-Free Business Security, Trendmicro Worry-Free Business Security Services, Microsoft Windows.