Trend Micro Deep Security Agent on Linux Task /GetCopiedFile taskname/fileid pathname traversal
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
3.2 | $0-$5k | 0.00 |
A vulnerability was found in Trend Micro Deep Security Agent on Linux (version now known) and classified as problematic. This issue affects some unknown processing of the file /GetCopiedFile of the component Task Handler. The manipulation of the argument taskname/fileid
with an unknown input leads to a pathname traversal vulnerability. Using CWE to declare the problem leads to CWE-21. Impacted is confidentiality.
The weakness was shared 01/21/2022 as MZ-21-02. The advisory is shared at modzero.com. The identification of this vulnerability is CVE-2022-23119 since 01/11/2022. Technical details as well as a public exploit are known. MITRE ATT&CK project uses the attack technique T1006 for this issue.
The exploit is available at modzero.com. It is declared as proof-of-concept.
Upgrading eliminates this vulnerability.
Product
Vendor
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 3.5VulDB Meta Temp Score: 3.2
VulDB Base Score: 3.5
VulDB Temp Score: 3.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Pathname traversalCWE: CWE-21 / CWE-22
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Partially
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
01/11/2022 🔍01/21/2022 🔍
01/21/2022 🔍
07/27/2023 🔍
Sources
Vendor: trendmicro.comAdvisory: MZ-21-02
Status: Confirmed
CVE: CVE-2022-23119 (🔍)
scip Labs: https://www.scip.ch/en/?labs.20161013
Entry
Created: 01/21/2022 08:24Updated: 07/27/2023 09:10
Changes: 01/21/2022 08:24 (44), 01/26/2022 11:14 (1), 07/27/2023 09:10 (2)
Complete: 🔍
Cache ID: 3:E0A:103
Could You use the Official NVD Nist cpe "trendmicro:deep_security_agent" instead of "trend_micro:deep_security_agent" ?
We would be very grateful.
Best Regards,
TEAM CERT
Interested in the pricing of exploits?
See the underground prices here!