Source: securityaffairs.com – Author: Pierluigi Paganini
CISA adds Trend Micro Apex One and Worry-Free Business Security flaw to its Known Exploited Vulnerabilities catalog
Pierluigi Paganini
September 22, 2023
US CISA added the flaw CVE-2023-41179 in Trend Micro Apex and other security products to its Known Exploited Vulnerabilities catalog.
US Cybersecurity and Infrastructure Security Agency (CISA) added the high-severity flaw CVE-2023-41179 (CVSS score 7.2) affecting Trend Micro Apex One and Worry-Free Business Security to its Known Exploited Vulnerabilities Catalog.
Trend Micro this week has released security updates to patch an actively exploited zero-day vulnerability, tracked as CVE-2023-41179, impacting endpoint security products, including Apex One, Apex One SaaS, and Worry-Free Business Security products.
According to the security firm the vulnerability has been exploited in attacks. The flaw is related to the products’ ability to uninstall third-party security software.
An attacker can trigger this vulnerability after it has logged into the product’s administrative console.
“An arbitrary code execution vulnerability has been identified in the Apex One SaaS, Biz, and VBBSS agents’ ability to uninstall third-party security products. To exploit this vulnerability, an attacker would need to be able to log into the product’s administrative console.” reads the advisory published by Trend Micro. Because an attacker would need to have stolen the product’s management console authentication information in advance, they would not be able to infiltrate the target network using this vulnerability alone.”
The vendor recommends customers update their installs to the latest version as soon as possible.
Trend Micro pointed out that the exploitation of this type of flaw typically requires an attacker to have access to the vulnerable device. To mitigate the risk of exploitation the company recommends allowing access only from trusted networks.
Trend Micro has not shared any information regarding the attacks exploiting this vulnerability.
The Japan CERT already published an alert regarding this vulnerability.
“Since the vulnerability is already being exploited in the wild, the users of the affected products are recommended to update the affected system to the latest version as soon as possible.” reads the alert.
According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.
Experts recommend also private organizations review the Catalog and address the vulnerabilities in their infrastructure.
CISA orders federal agencies to fix this flaw by October 12, 2023.
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, CISA)
Original Post URL: https://securityaffairs.com/151211/hacking/cisa-adds-trend-micro-apex-one-rce-to-known-exploited-vulnerabilities-catalog.html
Category & Tags: Breaking News,Hacking,Security,CISA,hacking news,information security news,IT Information Security,Known Exploited Vulnerabilities Catalog,Pierluigi Paganini,Security Affairs,Security News – Breaking News,Hacking,Security,CISA,hacking news,information security news,IT Information Security,Known Exploited Vulnerabilities Catalog,Pierluigi Paganini,Security Affairs,Security News
Views: 0