CVE-2022-28339
Trend Micro HouseCall for Home Networks vulnerability analysis and mitigation

Overview

Trend Micro HouseCall for Home Networks version 5.3.1302 and below contains an uncontrolled search patch element vulnerability that was disclosed on February 22, 2025. The vulnerability, tracked as CVE-2022-28339, affects the Windows platform and could allow an attacker with low user privileges to create a malicious DLL that could lead to escalated privileges (Trend Micro Advisory).

Technical details

The specific flaw exists within the log4j scanner component of HouseCall for Home Networks. The process loads a file from an unsecured location, which creates the vulnerability. The issue has been assigned a CVSS v3.1 base score of 7.3 (HIGH) with the vector string: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H, indicating local access is required with low attack complexity and privileges required (ZDI Advisory).

Impact

A successful exploitation of this vulnerability could allow an attacker to escalate privileges and execute arbitrary code in the context of an administrator. This means an attacker could gain elevated access to system resources that would normally be protected from unauthorized users (ZDI Advisory).

Mitigation and workarounds

Trend Micro has released version 5.3.1308 of HouseCall for Home Networks to resolve this vulnerability. No other mitigating factors have been identified, and customers are advised to ensure they always have the latest version of the program installed (Trend Micro Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management