Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2022-35234 CVE-2022-37347 CVE-2022-37348 |
CWE-ID | CWE-125 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Trend Micro Security (Consumer) Client/Desktop applications / Software for system administration Maximum Security Client/Desktop applications / Antivirus software/Personal firewalls |
Vendor | Trend Micro |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU65018
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-35234
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the User Mode Hooking Monitor Engine. A local user can trigger an out-of-bounds read error and read contents of memory on the system or cause the application.
MitigationInstall updates from vendor's website.
Vulnerable software versionsTrend Micro Security (Consumer): 17.7.1130 - 17.7.1383
Maximum Security: 2021 (v17) - 2022 17.7.1383
CPE2.3https://helpcenter.trendmicro.com/en-us/article/TMKA-11058
https://www.zerodayinitiative.com/advisories/ZDI-22-962/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66907
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37347
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the User Mode Hooking Monitor Engine. A local user can pass specially crafted input to the application and read contents of memory on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMaximum Security: 2021 (v17) - 2022 17.7.1383
Trend Micro Security (Consumer): 17.7 hotfix - 17.7.1383
CPE2.3https://www.zerodayinitiative.com/advisories/ZDI-22-1176/
https://helpcenter.trendmicro.com/en-us/article/tmka-11058
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66905
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37348
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the User Mode Hooking Monitor Engine. A local user can pass specially crafted input to the application and read contents of memory on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMaximum Security: 2021 (v17) - 2022 17.7.1383
Trend Micro Security (Consumer): 17.7 hotfix - 17.7.1383
CPE2.3https://www.zerodayinitiative.com/advisories/ZDI-22-1177/
https://helpcenter.trendmicro.com/en-us/article/tmka-11058
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.