Vulnerability Database

325,773

Total vulnerabilities in the database

CVE-2022-23120

A code injection vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to escalate privileges and run arbitrary code in the context of root. Please note: an attacker must first obtain access to the target agent in an un-activated and unconfigured state in order to exploit this vulnerability.

  • Published: Jan 20, 2022
  • Updated: Nov 16, 2025
  • CVE: CVE-2022-23120
  • Severity: High
  • Exploit:

CVSS v3:

  • Severity: High
  • Score: 7.8
  • AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v2:

  • Severity: Medium
  • Score: 6.9
  • AV:L/AC:M/Au:N/C:C/I:C/A:C

CWEs:

Software From Fixed in
trendmicro / deep_security_agent 20.0 20.0.0-3445
trendmicro / deep_security_agent 10.0 10.0.x
trendmicro / deep_security_agent 10.0-update1 10.0-update1.x
trendmicro / deep_security_agent 10.0-update2 10.0-update2.x
trendmicro / deep_security_agent 10.0-update3 10.0-update3.x
trendmicro / deep_security_agent 10.0-update4 10.0-update4.x
trendmicro / deep_security_agent 10.0-update5 10.0-update5.x
trendmicro / deep_security_agent 10.0-update6 10.0-update6.x
trendmicro / deep_security_agent 10.0-update7 10.0-update7.x
trendmicro / deep_security_agent 10.0-update8 10.0-update8.x
trendmicro / deep_security_agent 10.0-update9 10.0-update9.x
trendmicro / deep_security_agent 10.0-update10 10.0-update10.x
trendmicro / deep_security_agent 10.0-update11 10.0-update11.x
trendmicro / deep_security_agent 10.0-update12 10.0-update12.x
trendmicro / deep_security_agent 10.0-update13 10.0-update13.x
trendmicro / deep_security_agent 10.0-update14 10.0-update14.x
trendmicro / deep_security_agent 10.0-update15 10.0-update15.x
trendmicro / deep_security_agent 10.0-update16 10.0-update16.x
trendmicro / deep_security_agent 10.0-update17 10.0-update17.x
trendmicro / deep_security_agent 10.0-update18 10.0-update18.x
trendmicro / deep_security_agent 10.0-update19 10.0-update19.x
trendmicro / deep_security_agent 10.0-update20 10.0-update20.x
trendmicro / deep_security_agent 10.0-update21 10.0-update21.x
trendmicro / deep_security_agent 10.0-update22 10.0-update22.x
trendmicro / deep_security_agent 10.0-update23 10.0-update23.x
trendmicro / deep_security_agent 10.0-update24 10.0-update24.x
trendmicro / deep_security_agent 10.0-update25 10.0-update25.x
trendmicro / deep_security_agent 10.0-update26 10.0-update26.x
trendmicro / deep_security_agent 10.0-update27 10.0-update27.x
trendmicro / deep_security_agent 10.0-update28 10.0-update28.x
trendmicro / deep_security_agent 10.0-update29 10.0-update29.x
trendmicro / deep_security_agent 10.0-update30 10.0-update30.x
trendmicro / deep_security_agent 10.0-update31 10.0-update31.x
trendmicro / deep_security_agent 11.0 11.0.x
trendmicro / deep_security_agent 11.0-update1 11.0-update1.x
trendmicro / deep_security_agent 11.0-update2 11.0-update2.x
trendmicro / deep_security_agent 11.0-update3 11.0-update3.x
trendmicro / deep_security_agent 11.0-update4 11.0-update4.x
trendmicro / deep_security_agent 11.0-update5 11.0-update5.x
trendmicro / deep_security_agent 11.0-update6 11.0-update6.x
trendmicro / deep_security_agent 11.0-update7 11.0-update7.x
trendmicro / deep_security_agent 11.0-update8 11.0-update8.x
trendmicro / deep_security_agent 11.0-update9 11.0-update9.x
trendmicro / deep_security_agent 11.0-update10 11.0-update10.x
trendmicro / deep_security_agent 11.0-update11 11.0-update11.x
trendmicro / deep_security_agent 11.0-update12 11.0-update12.x
trendmicro / deep_security_agent 11.0-update13 11.0-update13.x
trendmicro / deep_security_agent 11.0-update14 11.0-update14.x
trendmicro / deep_security_agent 11.0-update15 11.0-update15.x
trendmicro / deep_security_agent 11.0-update16 11.0-update16.x
trendmicro / deep_security_agent 11.0-update17 11.0-update17.x
trendmicro / deep_security_agent 11.0-update18 11.0-update18.x
trendmicro / deep_security_agent 11.0-update19 11.0-update19.x
trendmicro / deep_security_agent 11.0-update20 11.0-update20.x
trendmicro / deep_security_agent 11.0-update21 11.0-update21.x
trendmicro / deep_security_agent 11.0-update22 11.0-update22.x
trendmicro / deep_security_agent 11.0-update23 11.0-update23.x
trendmicro / deep_security_agent 11.0-update24 11.0-update24.x
trendmicro / deep_security_agent 11.0-update25 11.0-update25.x
trendmicro / deep_security_agent 11.0-update26 11.0-update26.x
trendmicro / deep_security_agent 11.0-update27 11.0-update27.x
trendmicro / deep_security_agent 12.0 12.0.x
trendmicro / deep_security_agent 12.0-update1 12.0-update1.x
trendmicro / deep_security_agent 12.0-update2 12.0-update2.x
trendmicro / deep_security_agent 12.0-update3 12.0-update3.x
trendmicro / deep_security_agent 12.0-update4 12.0-update4.x
trendmicro / deep_security_agent 12.0-update5 12.0-update5.x
trendmicro / deep_security_agent 12.0-update6 12.0-update6.x
trendmicro / deep_security_agent 12.0-update7 12.0-update7.x
trendmicro / deep_security_agent 12.0-update8 12.0-update8.x
trendmicro / deep_security_agent 12.0-update9 12.0-update9.x
trendmicro / deep_security_agent 12.0-update10 12.0-update10.x
trendmicro / deep_security_agent 12.0-update11 12.0-update11.x
trendmicro / deep_security_agent 12.0-update12 12.0-update12.x
trendmicro / deep_security_agent 12.0-update13 12.0-update13.x
trendmicro / deep_security_agent 12.0-update14 12.0-update14.x
trendmicro / deep_security_agent 12.0-update15 12.0-update15.x
trendmicro / deep_security_agent 12.0-update16 12.0-update16.x
trendmicro / deep_security_agent 12.0-update17 12.0-update17.x
trendmicro / deep_security_agent 12.0-update18 12.0-update18.x
trendmicro / deep_security_agent 12.0-update19 12.0-update19.x
trendmicro / deep_security_agent 12.0-update20 12.0-update20.x
trendmicro / deep_security_agent 12.0-update21 12.0-update21.x

Frequently Asked Questions

A security vulnerability is a weakness in software, hardware, or configuration that can be exploited to compromise confidentiality, integrity, or availability. Many vulnerabilities are tracked as CVEs (Common Vulnerabilities and Exposures), which provide a standardized identifier so teams can coordinate patching, mitigation, and risk assessment across tools and vendors.

CVSS (Common Vulnerability Scoring System) estimates technical severity, but it doesn't automatically equal business risk. Prioritize using context like internet exposure, affected asset criticality, known exploitation (proof-of-concept or in-the-wild), and whether compensating controls exist. A "Medium" CVSS on an exposed, production system can be more urgent than a "Critical" on an isolated, non-production host.

A vulnerability is the underlying weakness. An exploit is the method or code used to take advantage of it. A zero-day is a vulnerability that is unknown to the vendor or has no publicly available fix when attackers begin using it. In practice, risk increases sharply when exploitation becomes reliable or widespread.

Recurring findings usually come from incomplete Asset Discovery, inconsistent patch management, inherited images, and configuration drift. In modern environments, you also need to watch the software supply chain: dependencies, containers, build pipelines, and third-party services can reintroduce the same weakness even after you patch a single host. Unknown or unmanaged assets (often called Shadow IT) are a common reason the same issues resurface.

Use a simple, repeatable triage model: focus first on externally exposed assets, high-value systems (identity, VPN, email, production), vulnerabilities with known exploits, and issues that enable remote code execution or privilege escalation. Then enforce patch SLAs and track progress using consistent metrics so remediation is steady, not reactive.

SynScan combines attack surface monitoring and continuous security auditing to keep your inventory current, flag high-impact vulnerabilities early, and help you turn raw findings into a practical remediation plan.