CVE-2022-40139

Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution. Please note: an attacker must first obtain Apex One server administration console access in order to exploit this vulnerability.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:trendmicro:apex_one:-:*:*:*:saas:*:*:*
cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

12 Feb 2025, 20:44

Type Values Removed Values Added
CPE cpe:2.3:a:trendmicro:apex_one:-:*:*:*:*:saas:*:* cpe:2.3:a:trendmicro:apex_one:-:*:*:*:saas:*:*:*

Information

Published : 2022-09-19 18:15

Updated : 2025-02-12 20:44


NVD link : CVE-2022-40139

Mitre link : CVE-2022-40139

CVE.ORG link : CVE-2022-40139


JSON object : View

Products Affected

trendmicro

  • apex_one

microsoft

  • windows