Trend Micro has recently addressed a critical zero-day vulnerability, known as CVE-2023-41179 [1] [2] [3] [6], in their Endpoint security products [2], including Apex One and Worry-Free Business Security [1] [2] [3] [4] [5] [6] [7]. This vulnerability allows for arbitrary code execution and is specifically related to the products’ ability to uninstall third-party security software [5].

Description

The flaw [1] [2] [3] [5], which has a CVSS score of 9.1, requires attackers to have access to the product’s administrative console and stolen management console authentication [5]. It has been confirmed that this vulnerability has been actively exploited in real-world attacks. To address this issue, Trend Micro has promptly released security updates to patch the vulnerability and strongly advises users to update to the latest version. Additionally, it is recommended to limit access to the product’s administration console to trusted networks as an extra precautionary measure. The urgency of implementing these security measures is highlighted by the fact that this vulnerability has already been actively exploited in the wild.

Conclusion

The exploitation of this vulnerability poses significant risks, as it allows attackers to execute arbitrary code. However, Trend Micro has taken swift action by releasing security updates to address the issue. Users are strongly urged to update their software to the latest version to protect against potential attacks. Furthermore, limiting access to the administration console to trusted networks can provide an additional layer of security. It is crucial for organizations to prioritize these security measures to mitigate the impact of this vulnerability and prevent future attacks.

References

[1] https://vulnera.com/newswire/trend-micro-fixes-zero-day-vulnerability-under-attack-in-endpoint-security-products/
[2] https://securityonline.info/cve-2023-41179-critical-0-day-trend-micro-endpoint-security-vulnerability/
[3] https://thehackernews.com/2023/09/trend-micro-releases-urgent-fix-for.html
[4] https://allinfosecnews.com/item/trend-micro-addresses-actively-exploited-zero-day-in-apex-one-and-other-security-products-2023-09-20/
[5] https://flyytech.com/2023/09/20/trend-micro-patches-zero-day-endpoint-vulnerability/
[6] https://digital.nhs.uk/cyber-alerts/2023/cc-4382
[7] https://cert.be/en/warning-actively-exploited-critical-zero-day-vulnerability-affecting-trend-micro-apex-one-apex-one