| CVE ID | CVE-2024-36306 |
| CVSS SCORE | 6.1, AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H |
| AFFECTED VENDORS |
Trend Micro |
| AFFECTED PRODUCTS |
Apex One |
| VULNERABILITY DETAILS |
This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Damage Cleanup Engine, which runs within the Trend Micro Common Client Real-time Scan Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. |
| ADDITIONAL DETAILS |
Trend Micro has issued an update to correct this vulnerability. More details can be found at:
https://success.trendmicro.com/dcx/s/solution/000298063?language=en_US |
| DISCLOSURE TIMELINE |
|
| CREDIT | NT AUTHORITY\ANONYMOUS LOGON |