gsd-2022-40708
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This vulnerability is similar to, but not identical to CVE-2022-40707.
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2022-40708",
    "description": "An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This vulnerability is similar to, but not identical to CVE-2022-40707.",
    "id": "GSD-2022-40708"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2022-40708"
      ],
      "details": "An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This vulnerability is similar to, but not identical to CVE-2022-40707.",
      "id": "GSD-2022-40708",
      "modified": "2023-12-13T01:19:30.326753Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "security@trendmicro.com",
        "ID": "CVE-2022-40708",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "Trend Micro Deep Security",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "20"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "Trend Micro"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This vulnerability is similar to, but not identical to CVE-2022-40707."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "Out-Of-Bounds Read Information Disclosure"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://success.trendmicro.com/solution/000291590",
            "refsource": "MISC",
            "url": "https://success.trendmicro.com/solution/000291590"
          },
          {
            "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-1298/",
            "refsource": "MISC",
            "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1298/"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:-:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "34026BD4-6637-4267-BAFC-BF25927AF220",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1337:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "395BE207-3450-4DD8-A5B4-CA005A8A29E8",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1559:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "10692943-0205-42F3-8EBC-64499CC0A3D4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update158:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "4CD4971B-80E4-45E5-9895-34EA463D408C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update167:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "13310EBF-97B9-4266-9384-82550A55EBC9",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1681:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "F3DDAC1A-C2E5-4FFB-8A69-80819D39CF5E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update173:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "B5363299-C02D-4AB8-8C48-0A3AFF4F2D33",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update180:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "A2A56B00-44A5-451C-B8D0-19097E3A9C69",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update182:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "F1C90C28-9413-407B-BC1D-3F4037BDF235",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1822:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "6201FA1A-1F94-46DF-A7EE-6F4DE2910131",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update183:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "D2CD4BBE-7C1B-4FA8-98E5-D2DD2E2AAD26",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1876:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "E667A20B-65ED-434F-8A5F-220C87B175EB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update190:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "2F74BA58-9388-4715-9477-FC1005765FA9",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update198:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "8665FF69-6034-4D5F-8E2D-8DB1E07C7BE5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2009:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "2CCE7E62-6CBE-476F-A9E5-52790F90E5BA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update208:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "3912DDD3-A3B0-487F-A74A-9A529D69FFFD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update213:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "4D555FC6-8986-4891-90CC-DB4F24990167",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2204:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "920B4F3B-2D78-4B71-8B65-8AEF6AF2C735",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update223:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "E68C5D12-3E35-43D3-A5A0-2C029EFA0182",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update224:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "0C49595B-D6E5-42CC-B634-5F14B868C341",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2419:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "236653DA-EE2C-4923-A5C8-CC32305626FB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2593:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "A61BF475-18D9-4246-91C7-7A1B6A7B44AF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2740:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "DC90635A-4FEB-4F7A-B0BD-D4CCD1183A3B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2921:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "6D12CADF-AAA4-4E0B-93EC-81C5C3BDCA47",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3165:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "9FD0C979-641F-482B-9D05-B3B9A5F6D443",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3288:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "F56F3E88-3E65-4C3E-932D-6C8404F5A1BC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3445:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "2FF0DE00-851E-4185-8C0C-172252E3E7C6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3530:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "57A322DB-9E37-4508-B904-51F0305D4B9B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3771:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "9CEFF34B-1B17-416F-9068-9CE5DAC0F19D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3964:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "87A77C12-0F5C-4EA7-96BA-8B14E2795E69",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4185:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "87821A85-93F2-422B-8876-CF3729D99594",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4416:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "0C3E959C-D6D5-4DF0-A26E-95EBDCB8C901",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4726:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "F2F3C583-2A09-4448-B384-273B48D2B4E8",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4959:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "445BA171-0190-429A-8D4F-F857CEA5361E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5137:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "95889F1E-931E-40E4-99A1-9C1A4A8B0847",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update877:*:*:long_term_support:*:*:*",
                    "matchCriteriaId": "BF1E7ABB-DEF9-4CBD-B269-3091DC1CF2A4",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This vulnerability is similar to, but not identical to CVE-2022-40707."
          },
          {
            "lang": "es",
            "value": "Una vulnerabilidad de lectura fuera de l\u00edmites en Trend Micro Deep Security 20 y Cloud One - Workload Security Agent para Windows podr\u00eda permitir a un atacante local divulgar informaci\u00f3n confidencial en las instalaciones afectadas. Tenga en cuenta que un atacante debe obtener primero la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para poder explotar estas vulnerabilidades. Esta vulnerabilidad es similar, pero no id\u00e9ntica, a la CVE-2022-40707"
          }
        ],
        "id": "CVE-2022-40708",
        "lastModified": "2024-02-27T20:39:51.010",
        "metrics": {
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "LOCAL",
                "availabilityImpact": "NONE",
                "baseScore": 3.3,
                "baseSeverity": "LOW",
                "confidentialityImpact": "LOW",
                "integrityImpact": "NONE",
                "privilegesRequired": "LOW",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
                "version": "3.1"
              },
              "exploitabilityScore": 1.8,
              "impactScore": 1.4,
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        },
        "published": "2022-09-28T21:15:15.137",
        "references": [
          {
            "source": "security@trendmicro.com",
            "tags": [
              "Vendor Advisory"
            ],
            "url": "https://success.trendmicro.com/solution/000291590"
          },
          {
            "source": "security@trendmicro.com",
            "tags": [
              "Third Party Advisory",
              "VDB Entry"
            ],
            "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1298/"
          }
        ],
        "sourceIdentifier": "security@trendmicro.com",
        "vulnStatus": "Analyzed",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-125"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.