Trend Micro Releases Patches for Critical Security Flaw in Apex One and Worry-Free Business Security Solutions

Cybersecurity company Trend Micro has taken swift action to address a critical security flaw in its Apex One and Worry-Free Business Security solutions for Windows. The company has released patches and hotfixes after discovering that the vulnerability was actively exploited in real-world attacks. This article will delve into the details of the flaw, the urgency to address it, and the measures taken to mitigate the risk.

Vulnerability Details

Tracked as CVE-2023-41179, the vulnerability revolves around a third-party antivirus uninstaller module that comes bundled with Trend Micro’s software. Exploiting this flaw allows attackers to control and manipulate the component, enabling the execution of arbitrary commands on affected installations. The seriousness of this vulnerability is underscored by its high CVSS score of 9.1.

Active Exploitation in the Wild

Trend Micro has observed at least one instance of potential exploitation of this vulnerability in the wild. This discovery raises the alarm for users, stressing the need for immediate action to apply the available patches. Failing to do so could leave systems exposed to malicious attacks and compromise sensitive data.

CISA’s Known Exploited Vulnerabilities (KEV) Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its KEV catalog to include this Trend Micro vulnerability, along with eight others, due to confirmed evidence of active exploitation. This catalog serves as a valuable resource for IT professionals and organizations, helping them prioritize security measures and stay informed about emerging threats.

Workaround Recommendation

While waiting to apply the patches, Trend Micro suggests limiting access to the affected product’s administration console to trusted networks. By implementing this workaround, users can minimize the risk of unauthorized access while they await the installation of the necessary updates.

Impacted Products and Fixes

To address the vulnerability, Trend Micro has released specific fixes for each impacted product. For Apex One, version 2019 (on-premise) has been fixed in SP1 Patch 1 (B12380), while Apex One as a Service requires SP1 Patch 1 (B12380) and Agent version 14.0.12637. Similarly, Worry-Free Business Security version 10.0 SP1 is fixed in 10.0 SP1 Patch 2495, while Worry-Free Business Security Services are updated in the July 31, 2023, Monthly Maintenance Release. It is crucial for users of these products to promptly apply the appropriate patches to safeguard their systems.

CISA’s Additional Vulnerabilities

In addition to the Trend Micro flaw, CISA has added several other vulnerabilities to its CVE catalog. These vulnerabilities impact a range of products, including Realtek SDK, Zyxel EMG2926 Routers, Laravel Ignition, Samsung Mobile Devices, Owl Labs Meeting Owl, and MinIO. This emphasizes the importance of regularly checking the CVE catalog for potential vulnerabilities affecting various technologies and implementing the necessary security measures.

The flaw (CVE-2022-31460) was related to hard-coded credentials and had been added on June 8, 2022, with a CVSS score of 7.4. This serves as a reminder that vigilance against multiple vulnerabilities is essential. It’s worth noting that the Owl Labs Meeting Owl had previously been featured in the KEV catalog due to a different vulnerability.

The release of critical patches and hotfixes by Trend Micro highlights the company’s commitment to addressing security flaws promptly. With active exploitation of the vulnerability in the wild, users must take action swiftly to protect their systems from potential attacks. By following the provided recommendations, including limiting access to the affected product’s administration console and applying the necessary updates, users can fortify their defenses against these vulnerabilities. Staying informed about emerging threats through resources like CISA’s KEV catalog is vital for maintaining robust cybersecurity practices in today’s digital landscape.

Explore more