SB2024060452 - Multiple vulnerabilities in Trend Micro Apex One
Published: June 4, 2024 Updated: January 8, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 9 secuirty vulnerabilities.
1) Insufficient verification of data authenticity (CVE-ID: CVE-2024-36302)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to origin validation error. A local user can escalate privileges on the system.
2) Insufficient verification of data authenticity (CVE-ID: CVE-2024-36303)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to origin validation error. A local user can escalate privileges on the system.
3) Link following (CVE-ID: CVE-2024-36307)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to insecure link following. A local user can gain access to sensitive information about the agent on affected installations.
4) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2024-36304)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition. A local user can execute arbitrary code with elevated privileges.
5) Link following (CVE-ID: CVE-2024-36305)
The vulnerability allows a local user to escalate privileges on the system.
6) Link following (CVE-ID: CVE-2024-36306)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insecure link following in the Damage Cleanup Engine. A local user can perform a denial of service (DoS) attack.
7) Improper access control (CVE-ID: CVE-2024-37289)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper access restrictions. A local user can execute arbitrary code with elevated privileges.
8) SQL injection (CVE-ID: CVE-2024-39753)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data within the client management functionality in modOSCE. A remote user can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
9) PHP file inclusion (CVE-ID: CVE-2024-52047)
The vulnerability allows a remote user to include and execute arbitrary PHP files on the server.
The vulnerability exists due to incorrect input validation when including PHP files within the getWidgetPoolManager function. A remote authenticated user can send a specially crafted HTTP request to the affected application, include and execute arbitrary PHP code on the system with privileges of the web server.
Remediation
Install update from vendor's website.
References
- https://success.trendmicro.com/dcx/s/solution/000298063?language=en_US
- https://www.zerodayinitiative.com/advisories/ZDI-24-569/
- https://www.zerodayinitiative.com/advisories/ZDI-24-570/
- https://www.zerodayinitiative.com/advisories/ZDI-24-573/
- https://www.zerodayinitiative.com/advisories/ZDI-24-571/
- https://www.zerodayinitiative.com/advisories/ZDI-24-572/
- https://www.zerodayinitiative.com/advisories/ZDI-24-568/
- https://www.zerodayinitiative.com/advisories/ZDI-24-577/
- https://www.zerodayinitiative.com/advisories/ZDI-24-897/
- https://success.trendmicro.com/en-US/solution/KA-0016669
- https://www.zerodayinitiative.com/advisories/ZDI-25-007/