SB2022100805 - Multiple vulnerabilities in Trend Micro Apex One



SB2022100805 - Multiple vulnerabilities in Trend Micro Apex One

Published: October 8, 2022

Security Bulletin ID SB2022100805
Severity
Medium
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 17% Low 83%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2022-41744)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition in Vulnerability Protection Service. A local user can turn a specific working directory into a mount point on affected installations and escalate privileges on the system.


2) Input validation error (CVE-ID: CVE-2022-41749)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to origin validation error within the NT Listener service. A local user can execute arbitrary code with elevated privileges.


3) Out-of-bounds read (CVE-ID: CVE-2022-41745)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in NT Listener service. A local user can trigger an out-of-bounds read and execute arbitrary code with elevated privileges.


4) Missing Authorization (CVE-ID: CVE-2022-41746)

The vulnerability allows a remote user to compromise the affected system.

The vulnerability exists due to missing authorization within the the Apex One web console. A remote authenticated user can bypass authorization and gain write access to server configuration via a specific URL. Successful exploitation of the vulnerability may allow an attacker to reconfigure the server and associated endpoint agents.


5) Improper Certificate Validation (CVE-ID: CVE-2022-41747)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper certificate validation in Client Plug-in Service Manager when handling signed DLLs. A local administrator can bypass certain elements of the product's anti-tampering mechanisms and load a malicious DLL.


6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-41748)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due improperly imposed security restrictions within the Data Loss Prevention (DLP) module. A local privileged user can bypass certain elements of the product's anti-tampering mechanisms and escalate privileges on the system.


Remediation

Install update from vendor's website.