CVE-2022-28339
Published: 22 February 2025
Summary
CVE-2022-28339 is a high-severity Uncontrolled Search Path Element (CWE-427) vulnerability in Trendmicro Housecall For Home Networks. Its CVSS base score is 7.3 (High).
Operationally, ranked at the 21.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, testing, and installation of software patches to remediate the specific uncontrolled search path vulnerability in CVE-2022-28339.
Enforces secure configuration settings such as safe DLL search mode to prevent loading of malicious DLLs from uncontrolled paths exploited in CVE-2022-28339.
Implements least privilege to restrict low-privilege attackers from achieving successful privilege escalation even if a malicious DLL is loaded via CVE-2022-28339.
NVD Description
Trend Micro HouseCall for Home Networks version 5.3.1302 and below contains an uncontrolled search patch element vulnerability that could allow an attacker with low user privileges to create a malicious DLL that could lead to escalated privileges.
Deeper analysisAI
Trend Micro HouseCall for Home Networks version 5.3.1302 and below is affected by CVE-2022-28339, an uncontrolled search path element vulnerability (CWE-427). This flaw allows an attacker with low user privileges to create a malicious DLL, potentially leading to escalated privileges. The vulnerability has a CVSS v3.1 base score of 7.3 (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H), indicating high impact with local access required, low attack complexity, low privileges needed, and user interaction.
An attacker must have local access to the system and low-level user privileges to exploit this vulnerability. Exploitation requires user interaction, such as the victim running a specially crafted file or process that loads the attacker's malicious DLL due to the uncontrolled search path. Successful exploitation can result in high impacts to confidentiality, integrity, and availability, enabling the attacker to escalate privileges on the affected system.
For mitigation details, refer to the Trend Micro advisory at https://helpcenter.trendmicro.com/en-us/article/tmka-21734 and the Zero Day Initiative advisory at https://www.zerodayinitiative.com/advisories/ZDI-22-620/, which provide information on patches and remediation steps.
Details
- CWE(s)