Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2024-0047
Vulnerability from csaf_certbund
Published
2024-01-09 23:00
Modified
2024-01-11 23:00
Summary
Trend Micro Apex One und Apex Central: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Trend Micro Apex One ist eine Endpoint-Security Lösung.
Trend Micro Apex Central ist eine webbasierte Konsole, die eine zentrale Verwaltung für Trend Micro-Produkte und -Dienste bietet.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Trend Micro Apex One und Trend Micro Apex Central ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, Dateien zu manipulieren oder Cross-Site Scripting (XSS)-Angriffe durchzuführen.
Betroffene Betriebssysteme
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Trend Micro Apex One ist eine Endpoint-Security L\u00f6sung.\r\nTrend Micro Apex Central ist eine webbasierte Konsole, die eine zentrale Verwaltung f\u00fcr Trend Micro-Produkte und -Dienste bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Trend Micro Apex One und Trend Micro Apex Central ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0047 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0047.json" }, { "category": "self", "summary": "WID-SEC-2024-0047 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0047" }, { "category": "external", "summary": "Trend Micro Security Bulletin vom 2024-01-09", "url": "https://success.trendmicro.com/dcx/s/solution/000296151?language=en_US" }, { "category": "external", "summary": "Trend Micro Security Bulletin vom 2024-01-09", "url": "https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US" } ], "source_lang": "en-US", "title": "Trend Micro Apex One und Apex Central: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-11T23:00:00.000+00:00", "generator": { "date": "2024-08-15T18:03:27.724+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-0047", "initial_release_date": "2024-01-09T23:00:00.000+00:00", "revision_history": [ { "date": "2024-01-09T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-11T23:00:00.000+00:00", "number": "2", "summary": "CVE-Nummern erg\u00e4nzt" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Trend Micro Apex Central \u003c Patch 8 (b6658)", "product": { "name": "Trend Micro Apex Central \u003c Patch 8 (b6658)", "product_id": "T031949", "product_identification_helper": { "cpe": "cpe:/a:trendmicro:apex_central:patch_8_%28b6658%29" } } }, { "branches": [ { "category": "product_name", "name": "Trend Micro Apex One \u003c SP1 CP b12534", "product": { "name": "Trend Micro Apex One \u003c SP1 CP b12534", "product_id": "T031947", "product_identification_helper": { "cpe": "cpe:/a:trendmicro:apex_one:sp1_cp_b12534" } } }, { "category": "product_name", "name": "Trend Micro Apex One as a service \u003c 14.0.12849", "product": { "name": "Trend Micro Apex One as a service \u003c 14.0.12849", "product_id": "T031948", "product_identification_helper": { "cpe": "cpe:/a:trendmicro:apex_one:as_a_service__14.0.12849" } } } ], "category": "product_name", "name": "Apex One" } ], "category": "vendor", "name": "Trend Micro" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-52094", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Trend Micro Apex One. Diese Fehler bestehen in der Agent Engine, in der Anti-Spyware Engine, im Security Agent und im Updater aufgrund verschiedener Sicherheitsl\u00fccken. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Berechtigungen zu erweitern." } ], "release_date": "2024-01-09T23:00:00.000+00:00", "title": "CVE-2023-52094" }, { "cve": "CVE-2023-52093", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Trend Micro Apex One. Diese Fehler bestehen in der Agent Engine, in der Anti-Spyware Engine, im Security Agent und im Updater aufgrund verschiedener Sicherheitsl\u00fccken. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Berechtigungen zu erweitern." } ], "release_date": "2024-01-09T23:00:00.000+00:00", "title": "CVE-2023-52093" }, { "cve": "CVE-2023-52092", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Trend Micro Apex One. Diese Fehler bestehen in der Agent Engine, in der Anti-Spyware Engine, im Security Agent und im Updater aufgrund verschiedener Sicherheitsl\u00fccken. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Berechtigungen zu erweitern." } ], "release_date": "2024-01-09T23:00:00.000+00:00", "title": "CVE-2023-52092" }, { "cve": "CVE-2023-52091", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Trend Micro Apex One. Diese Fehler bestehen in der Agent Engine, in der Anti-Spyware Engine, im Security Agent und im Updater aufgrund verschiedener Sicherheitsl\u00fccken. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Berechtigungen zu erweitern." } ], "release_date": "2024-01-09T23:00:00.000+00:00", "title": "CVE-2023-52091" }, { "cve": "CVE-2023-52090", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Trend Micro Apex One. Diese Fehler bestehen in der Agent Engine, in der Anti-Spyware Engine, im Security Agent und im Updater aufgrund verschiedener Sicherheitsl\u00fccken. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Berechtigungen zu erweitern." } ], "release_date": "2024-01-09T23:00:00.000+00:00", "title": "CVE-2023-52090" }, { "cve": "CVE-2023-52331", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Trend Micro Apex Central. Diese Fehler bestehen in bestimmten Widgets und Dashboards aufgrund eines Dateieinschlusses und eines uneingeschr\u00e4nkten Datei-Upload-Problems. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Dateien zu manipulieren oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "release_date": "2024-01-09T23:00:00.000+00:00", "title": "CVE-2023-52331" }, { "cve": "CVE-2023-52330", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Trend Micro Apex Central. Diese Fehler bestehen in bestimmten Widgets und Dashboards aufgrund eines Dateieinschlusses und eines uneingeschr\u00e4nkten Datei-Upload-Problems. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Dateien zu manipulieren oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "release_date": "2024-01-09T23:00:00.000+00:00", "title": "CVE-2023-52330" }, { "cve": "CVE-2023-52329", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Trend Micro Apex Central. Diese Fehler bestehen in bestimmten Widgets und Dashboards aufgrund eines Dateieinschlusses und eines uneingeschr\u00e4nkten Datei-Upload-Problems. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Dateien zu manipulieren oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "release_date": "2024-01-09T23:00:00.000+00:00", "title": "CVE-2023-52329" }, { "cve": "CVE-2023-52328", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Trend Micro Apex Central. Diese Fehler bestehen in bestimmten Widgets und Dashboards aufgrund eines Dateieinschlusses und eines uneingeschr\u00e4nkten Datei-Upload-Problems. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Dateien zu manipulieren oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "release_date": "2024-01-09T23:00:00.000+00:00", "title": "CVE-2023-52328" }, { "cve": "CVE-2023-52327", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Trend Micro Apex Central. Diese Fehler bestehen in bestimmten Widgets und Dashboards aufgrund eines Dateieinschlusses und eines uneingeschr\u00e4nkten Datei-Upload-Problems. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Dateien zu manipulieren oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "release_date": "2024-01-09T23:00:00.000+00:00", "title": "CVE-2023-52327" }, { "cve": "CVE-2023-52326", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Trend Micro Apex Central. Diese Fehler bestehen in bestimmten Widgets und Dashboards aufgrund eines Dateieinschlusses und eines uneingeschr\u00e4nkten Datei-Upload-Problems. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Dateien zu manipulieren oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "release_date": "2024-01-09T23:00:00.000+00:00", "title": "CVE-2023-52326" }, { "cve": "CVE-2023-52325", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Trend Micro Apex Central. Diese Fehler bestehen in bestimmten Widgets und Dashboards aufgrund eines Dateieinschlusses und eines uneingeschr\u00e4nkten Datei-Upload-Problems. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Dateien zu manipulieren oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "release_date": "2024-01-09T23:00:00.000+00:00", "title": "CVE-2023-52325" }, { "cve": "CVE-2023-52324", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Trend Micro Apex Central. Diese Fehler bestehen in bestimmten Widgets und Dashboards aufgrund eines Dateieinschlusses und eines uneingeschr\u00e4nkten Datei-Upload-Problems. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Dateien zu manipulieren oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren." } ], "release_date": "2024-01-09T23:00:00.000+00:00", "title": "CVE-2023-52324" } ] }
CVE-2023-52326 (GCVE-0-2023-52326)
Vulnerability from cvelistv5
Published
2024-01-23 20:41
Modified
2025-06-20 18:57
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.
Please note this vulnerability is similar, but not identical to CVE-2023-52327.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.428Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-023/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52326", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-01-23T23:23:54.928598Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-20T18:57:06.709Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6570", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.\r\n\r\nPlease note this vulnerability is similar, but not identical to CVE-2023-52327." } ], "providerMetadata": { "dateUpdated": "2024-01-23T20:41:39.424Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-023/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-52326", "datePublished": "2024-01-23T20:41:39.424Z", "dateReserved": "2024-01-08T19:08:00.320Z", "dateUpdated": "2025-06-20T18:57:06.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-52327 (GCVE-0-2023-52327)
Vulnerability from cvelistv5
Published
2024-01-23 20:41
Modified
2025-06-10 16:03
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.
Please note this vulnerability is similar, but not identical to CVE-2023-52328.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.555Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-022/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52327", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-05T21:35:09.442257Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-10T16:03:07.531Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6570", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.\r\n\r\nPlease note this vulnerability is similar, but not identical to CVE-2023-52328." } ], "providerMetadata": { "dateUpdated": "2024-01-23T20:41:50.167Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-022/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-52327", "datePublished": "2024-01-23T20:41:50.167Z", "dateReserved": "2024-01-08T19:08:00.321Z", "dateUpdated": "2025-06-10T16:03:07.531Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-52324 (GCVE-0-2023-52324)
Vulnerability from cvelistv5
Published
2024-01-23 20:41
Modified
2025-05-30 14:18
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An unrestricted file upload vulnerability in Trend Micro Apex Central could allow a remote attacker to create arbitrary files on affected installations.
Please note: although authentication is required to exploit this vulnerability, this vulnerability could be exploited when the attacker has any valid set of credentials. Also, this vulnerability could be potentially used in combination with another vulnerability to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.057Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-077/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52324", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-08T17:30:31.968053Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-30T14:18:27.074Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6570", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An unrestricted file upload vulnerability in Trend Micro Apex Central could allow a remote attacker to create arbitrary files on affected installations.\r\n\r\nPlease note: although authentication is required to exploit this vulnerability, this vulnerability could be exploited when the attacker has any valid set of credentials. Also, this vulnerability could be potentially used in combination with another vulnerability to execute arbitrary code." } ], "providerMetadata": { "dateUpdated": "2024-01-23T20:41:10.369Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-077/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-52324", "datePublished": "2024-01-23T20:41:10.369Z", "dateReserved": "2024-01-08T19:08:00.320Z", "dateUpdated": "2025-05-30T14:18:27.074Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-52331 (GCVE-0-2023-52331)
Vulnerability from cvelistv5
Published
2024-01-23 20:42
Modified
2025-06-20 18:59
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central could allow an attacker to interact with internal or local services directly.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.399Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-052/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52331", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-24T16:55:15.536591Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918 Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-20T18:59:02.805Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6570", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central could allow an attacker to interact with internal or local services directly.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "providerMetadata": { "dateUpdated": "2024-01-23T20:42:46.349Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-052/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-52331", "datePublished": "2024-01-23T20:42:46.349Z", "dateReserved": "2024-01-11T03:45:00.948Z", "dateUpdated": "2025-06-20T18:59:02.805Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-52092 (GCVE-0-2023-52092)
Vulnerability from cvelistv5
Published
2024-01-23 20:40
Modified
2025-06-20 18:55
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 (14.0) ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.410Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000296151?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-025/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52092", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-01-30T18:12:11.980844Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-20T18:55:46.189Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.12534", "status": "affected", "version": "2019 (14.0)", "versionType": "semver" } ] }, { "product": "Trend Micro Apex One as a Service", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.12849", "status": "affected", "version": "SaaS\t", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "providerMetadata": { "dateUpdated": "2024-01-23T20:40:04.083Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000296151?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-025/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-52092", "datePublished": "2024-01-23T20:40:04.083Z", "dateReserved": "2023-12-26T18:39:33.448Z", "dateUpdated": "2025-06-20T18:55:46.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-52325 (GCVE-0-2023-52325)
Vulnerability from cvelistv5
Published
2024-01-23 20:41
Modified
2025-06-11 16:54
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A local file inclusion vulnerability in one of Trend Micro Apex Central's widgets could allow a remote attacker to execute arbitrary code on affected installations.
Please note: this vulnerability must be used in conjunction with another one to exploit an affected system. In addition, an attacker must first obtain a valid set of credentials on target system in order to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.389Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-024/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52325", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-26T19:46:22.273462Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-98", "description": "CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program (\u0027PHP Remote File Inclusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-11T16:54:38.294Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6570", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A local file inclusion vulnerability in one of Trend Micro Apex Central\u0027s widgets could allow a remote attacker to execute arbitrary code on affected installations.\r\n\r\nPlease note: this vulnerability must be used in conjunction with another one to exploit an affected system. In addition, an attacker must first obtain a valid set of credentials on target system in order to exploit this vulnerability." } ], "providerMetadata": { "dateUpdated": "2024-01-23T20:41:25.754Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-024/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-52325", "datePublished": "2024-01-23T20:41:25.754Z", "dateReserved": "2024-01-08T19:08:00.320Z", "dateUpdated": "2025-06-11T16:54:38.294Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-52090 (GCVE-0-2023-52090)
Vulnerability from cvelistv5
Published
2024-01-23 20:39
Modified
2025-06-20 18:54
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 (14.0) ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.132Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000296151?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-026/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52090", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-01-30T18:12:27.988609Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-20T18:54:22.218Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.12534", "status": "affected", "version": "2019 (14.0)", "versionType": "semver" } ] }, { "product": "Trend Micro Apex One as a Service", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.12849", "status": "affected", "version": "SaaS\t", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "providerMetadata": { "dateUpdated": "2024-01-23T20:39:38.067Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000296151?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-026/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-52090", "datePublished": "2024-01-23T20:39:38.067Z", "dateReserved": "2023-12-26T18:39:33.448Z", "dateUpdated": "2025-06-20T18:54:22.218Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-52329 (GCVE-0-2023-52329)
Vulnerability from cvelistv5
Published
2024-01-23 20:42
Modified
2025-06-17 15:15
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.
Please note this vulnerability is similar, but not identical to CVE-2023-52326.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.159Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-074/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52329", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T15:25:40.220369Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T15:15:17.060Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6570", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.\r\n\r\nPlease note this vulnerability is similar, but not identical to CVE-2023-52326." } ], "providerMetadata": { "dateUpdated": "2024-01-23T20:42:13.269Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-074/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-52329", "datePublished": "2024-01-23T20:42:13.269Z", "dateReserved": "2024-01-11T03:45:00.948Z", "dateUpdated": "2025-06-17T15:15:17.060Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-52093 (GCVE-0-2023-52093)
Vulnerability from cvelistv5
Published
2024-01-23 20:40
Modified
2024-08-29 19:58
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An exposed dangerous function vulnerability in the Trend Micro Apex One agent could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 (14.0) ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.437Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000296151?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-029/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:apex_one:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "apex_one", "vendor": "trendmicro", "versions": [ { "lessThan": "14.0.0.12534", "status": "affected", "version": "14.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:trendmicro:apex_one:-:*:*:*:saas:*:*:*" ], "defaultStatus": "affected", "product": "apex_one", "vendor": "trendmicro", "versions": [ { "lessThan": "14.0.12849", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52093", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-27T13:49:09.036432Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-29T19:58:22.570Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.12534", "status": "affected", "version": "2019 (14.0)", "versionType": "semver" } ] }, { "product": "Trend Micro Apex One as a Service", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.12849", "status": "affected", "version": "SaaS\t", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An exposed dangerous function vulnerability in the Trend Micro Apex One agent could allow a local attacker to escalate privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "providerMetadata": { "dateUpdated": "2024-01-23T20:40:17.347Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000296151?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-029/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-52093", "datePublished": "2024-01-23T20:40:17.347Z", "dateReserved": "2023-12-26T18:39:33.448Z", "dateUpdated": "2024-08-29T19:58:22.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-52330 (GCVE-0-2023-52330)
Vulnerability from cvelistv5
Published
2024-01-23 20:42
Modified
2025-06-20 18:57
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A cross-site scripting vulnerability in Trend Micro Apex Central could allow a remote attacker to execute arbitrary code on affected installations of Trend Micro Apex Central.
Please note: user interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.318Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-051/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52330", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-01-24T16:14:44.156345Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-20T18:57:57.906Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6570", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A cross-site scripting vulnerability in Trend Micro Apex Central could allow a remote attacker to execute arbitrary code on affected installations of Trend Micro Apex Central.\r\n\r\nPlease note: user interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file." } ], "providerMetadata": { "dateUpdated": "2024-01-23T20:42:34.678Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-051/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-52330", "datePublished": "2024-01-23T20:42:34.678Z", "dateReserved": "2024-01-11T03:45:00.948Z", "dateUpdated": "2025-06-20T18:57:57.906Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-52094 (GCVE-0-2023-52094)
Vulnerability from cvelistv5
Published
2024-01-23 20:40
Modified
2025-06-20 18:56
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An updater link following vulnerability in the Trend Micro Apex One agent could allow a local attacker to abuse the updater to delete an arbitrary folder, leading for a local privilege escalation on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 (14.0) ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.527Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000296151?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-028/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52094", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-01-30T18:11:35.590111Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-20T18:56:24.284Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.12534", "status": "affected", "version": "2019 (14.0)", "versionType": "semver" } ] }, { "product": "Trend Micro Apex One as a Service", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.12849", "status": "affected", "version": "SaaS\t", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An updater link following vulnerability in the Trend Micro Apex One agent could allow a local attacker to abuse the updater to delete an arbitrary folder, leading for a local privilege escalation on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "providerMetadata": { "dateUpdated": "2024-01-23T20:40:30.228Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000296151?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-028/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-52094", "datePublished": "2024-01-23T20:40:30.228Z", "dateReserved": "2023-12-26T18:39:33.449Z", "dateUpdated": "2025-06-20T18:56:24.284Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-52328 (GCVE-0-2023-52328)
Vulnerability from cvelistv5
Published
2024-01-23 20:42
Modified
2025-05-30 14:18
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.
Please note this vulnerability is similar, but not identical to CVE-2023-52329.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.669Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-021/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52328", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-08T20:15:24.253175Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-30T14:18:21.016Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6570", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.\r\n\r\nPlease note this vulnerability is similar, but not identical to CVE-2023-52329." } ], "providerMetadata": { "dateUpdated": "2024-01-23T20:42:01.780Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-021/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-52328", "datePublished": "2024-01-23T20:42:01.780Z", "dateReserved": "2024-01-08T19:08:00.321Z", "dateUpdated": "2025-05-30T14:18:21.016Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-52091 (GCVE-0-2023-52091)
Vulnerability from cvelistv5
Published
2024-01-23 20:39
Modified
2025-06-20 18:55
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An anti-spyware engine link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 (14.0) ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000296151?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-027/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52091", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-01-24T22:06:48.681943Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-20T18:55:01.618Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.12534", "status": "affected", "version": "2019 (14.0)", "versionType": "semver" } ] }, { "product": "Trend Micro Apex One as a Service", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.12849", "status": "affected", "version": "SaaS\t", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An anti-spyware engine link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "providerMetadata": { "dateUpdated": "2024-01-23T20:39:50.527Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000296151?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-027/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-52091", "datePublished": "2024-01-23T20:39:50.527Z", "dateReserved": "2023-12-26T18:39:33.448Z", "dateUpdated": "2025-06-20T18:55:01.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…