7.2

CVE-2023-41179

Warning

A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Free Business Security Services could allow an attacker to manipulate the module to execute arbitrary commands on an affected installation.

Note that an attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.

Data is provided by the National Vulnerability Database (NVD)
TrendmicroApex One Version2019
   MicrosoftWindows Version-
TrendmicroApex One Version2019 SwEditionsaas
   MicrosoftWindows Version-
TrendmicroWorry-free Business Security Version10.0 Updatesp1
   MicrosoftWindows Version-
TrendmicroWorry-free Business Security Services Version- SwEditionsaas
   MicrosoftWindows Version-

21.09.2023: CISA Known Exploited Vulnerabilities (KEV) Catalog

Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability

Vulnerability

Trend Micro Apex One and Worry-Free Business Security contain an unspecified vulnerability in the third-party anti-virus uninstaller that could allow an attacker to manipulate the module to conduct remote code execution. An attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.

Description

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.27% 0.788
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.