Trend Micro VPN, version 5.8.1012 and below is vulnerable to an arbitrary file overwrite under specific conditions that can lead to elevation of privileges.
References
Link | Resource |
---|---|
https://helpcenter.trendmicro.com/en-us/article/tmka-14460 | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-24-1022/ | Third Party Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-24-1023/ | Third Party Advisory |
Configurations
History
31 Jul 2025, 16:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:trendmicro:vpn:*:*:*:*:*:windows:*:* | |
First Time |
Trendmicro
Trendmicro vpn |
|
References | () https://helpcenter.trendmicro.com/en-us/article/tmka-14460 - Vendor Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-24-1022/ - Third Party Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-24-1023/ - Third Party Advisory |
13 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-73 |
23 Oct 2024, 15:12
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
22 Oct 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-22 19:15
Updated : 2025-07-31 16:14
NVD link : CVE-2024-41183
Mitre link : CVE-2024-41183
CVE.ORG link : CVE-2024-41183
JSON object : View
Products Affected
trendmicro
- vpn
CWE
CWE-73
External Control of File Name or Path