Published:2022/11/18  Last Updated:2022/11/18

JVNVU#90082799
Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service

Overview

Trend Micro Incorporated has released security updates for Apex One and Apex One as a Service.

Products Affected

  • Apex One On Premise (2019)
  • Apex One as a Service

Description

Trend Micro Incorporated has released security updates for Apex One and Apex One as a Service.

Impact

  • Information disclosure due to Out-of-Bounds read vulnerabilities
  • Privilege escalation due to an Out-of-Bounds access vulnerability in the Unauthorized Change Prevention Service
  • Privilege escalation due to a memory corruption vulnerability in the Unauthorized Change Prevention Service
  • Privilege escalation due to a Time-of-Check Time-of-Use (TOCTOU) race condition vulnerability in the Security Agent
  • Privilege escalation due to an improper handling of exceptional conditions vulnerability
  • Privilege escalation due to a directory traversal vulnerability in the Security Agent
  • Memory corruption due to missing SAFESEH memory protection mechanism in some modules

Solution

Apply the Patch
Apply the patch according to the information provided by the developer.
The developer has released the following patch to fix these vulnerabilities.

  • Trend Micro Apex One On Premise (2019) Service Pack 1 Critical Patch b11128
The issues in Trend Micro Apex One as a Service are already fixed in October 2022 updates.

Apply the Workaround
Applying the following workaround may mitigate the impact of these vulnerabilities.
  • Permit access to the product only from the trusted network

Vendor Status

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE
JVN iPedia