SB20230516111 - Multiple vulnerabilities in Trend Micro Apex One
Published: May 16, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-30902)
The vulnerability allows a local attacker to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions. A local attacker can delete privileged Trend Micro registry keys including its own protected registry keys.
2) Improper access control (CVE-ID: CVE-2023-32552)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote attacker can bypass implemented security restrictions and gain access to sensitive information on agents.
3) Race condition (CVE-ID: CVE-2023-32554)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.
4) Improper access control (CVE-ID: CVE-2023-32553)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote attacker can bypass implemented security restrictions and gain access to sensitive information on agents.
5) Race condition (CVE-ID: CVE-2023-32555)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.
6) Link following (CVE-ID: CVE-2023-32556)
The vulnerability allows a local user to gain access to sensitive information.
The
vulnerability exists due to a symlink following issue. A local user can
create a specially crafted symbolic link to a critical file on the
system and gain access to sensitive information.
7) Arbitrary file upload (CVE-ID: CVE-2023-32557)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to insufficient validation of file during file upload. A remote non-authenticated attacker can upload a malicious file and execute it on the server.
Remediation
Install update from vendor's website.