A link following vulnerability in Trend Micro Deep Security 20.0 agents could allow a local attacker to create a denial of service (DoS) situation on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
History

Tue, 09 Sep 2025 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
CPEs cpe:2.3:a:trendmicro:deep_security_agent:*:*:*:*:long_term_support:*:*:*
cpe:2.3:a:trendmicro:deep_security_agent:20.0.1:-:*:*:long_term_support:*:*:*
cpe:2.3:a:trendmicro:deep_security_agent:20.0.1:update12510:*:*:long_term_support:*:*:*
cpe:2.3:a:trendmicro:deep_security_agent:20.0.1:update14610:*:*:long_term_support:*:*:*
cpe:2.3:a:trendmicro:deep_security_agent:20.0.1:update17380:*:*:long_term_support:*:*:*
cpe:2.3:a:trendmicro:deep_security_agent:20.0.1:update19250:*:*:long_term_support:*:*:*
cpe:2.3:a:trendmicro:deep_security_agent:20.0.1:update21510:*:*:long_term_support:*:*:*
cpe:2.3:a:trendmicro:deep_security_agent:20.0.1:update23340:*:*:long_term_support:*:*:*
cpe:2.3:a:trendmicro:deep_security_agent:20.0.1:update3180:*:*:long_term_support:*:*:*
cpe:2.3:a:trendmicro:deep_security_agent:20.0.1:update4540:*:*:long_term_support:*:*:*
cpe:2.3:a:trendmicro:deep_security_agent:20.0.1:update690:*:*:long_term_support:*:*:*
cpe:2.3:a:trendmicro:deep_security_agent:20.0.1:update7380:*:*:long_term_support:*:*:*
cpe:2.3:a:trendmicro:deep_security_agent:20.0.1:update9400:*:*:long_term_support:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows

Fri, 20 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Jun 2025 20:30:00 +0000

Type Values Removed Values Added
Description A link following vulnerability in Trend Micro Deep Security 20.0 agents could allow a local attacker to create a denial of service (DoS) situation on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
First Time appeared Trendmicro
Trendmicro deep Security Agent
Weaknesses CWE-59
CPEs cpe:2.3:a:trendmicro:deep_security_agent:20.0.1-25770:long_term_support:*:*:*:*:*:*
Vendors & Products Trendmicro
Trendmicro deep Security Agent
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: trendmicro

Published: 2025-06-17T20:11:03.855Z

Updated: 2025-06-20T13:12:28.114Z

Reserved: 2025-03-24T18:39:10.814Z

Link: CVE-2025-30642

cve-icon Vulnrichment

Updated: 2025-06-18T14:19:49.140Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-17T21:15:37.840

Modified: 2025-09-09T14:45:49.457

Link: CVE-2025-30642

cve-icon Redhat

No data.