Release Date: March 26, 2022
Trend Micro Vulnerability Identifier: CVE-2022-27883
Platform(s): macOS
Summary
Trend Micro has released an update via ActiveUpdate for Trend Micro Antivirus for Mac 11.5 that resolves a Link Following Privilege Escalation vulnerability.
Affected version(s)
PRODUCT | AFFECTED VERSION(S) | PLATFORM | LANGUAGE(S) |
---|---|---|---|
Antivirus for Mac | 11.5 and below | macOS | English |
Solution
Trend Micro has released an update via ActiveUpdate to resolve this issue:
PRODUCT | MODULE | UPDATED VERSION(S) | PLATFORM | LANGUAGE(S) |
---|---|---|---|---|
All Versions Above | ICORE_x64 | 3.2.5010 | macOS | English |
All Versions Above | Client | 11.5.1038 | macOS | English |
Vulnerability Details
This update resolves a vulnerability in the product that allows an attacker to create a specially-crafted file as a symlink that can lead to privilege escalation. Please note that an attacker must at least have low-level privileges on the system to attempt to exploit this vulnerability.
Trend Micro has received no reports nor is aware of any actual attacks against the affected products related to this vulnerability at this time.
Mitigating Factors
None identified. Customers are advised to ensure they always have the latest version of the program.
Acknowledgment
Trend Micro would like to thank Cees Elzinga working with Trend Micro Zero Day Initiative for responsibly disclosing this issue and working with Trend Micro to help protect our customers.
Additional Assistance
Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.
External Reference
- ZDI-CAN-14816