{"vulnerability": "CVE-2021-32465", "sightings": [{"uuid": "8d569aed-2d2d-4305-82cd-f89312c92d5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32465", "type": "exploited", "source": "https://t.me/cKure/6595", "content": "\u25a0\u25a0\u25a1\u25a1\u25a1 Security firms Trend Micro is warning its customers of attacks exploiting zero-day vulnerabilities in its Apex One and Apex One as a Service products.\n\nThe security firm also reported that attackers already exploited at least two of the flaws (CVE-2021-32464, CVE-2021-32465, CVE-2021-36741, CVE-2021-36742) in attacks in the wild.", "creation_timestamp": "2021-08-13T05:19:44.000000Z"}, {"uuid": "6041a4ed-bc58-4037-b270-45a024e14d41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32465", "type": "seen", "source": "https://t.me/cibsecurity/26848", "content": "\u203c CVE-2021-32465 \u203c\n\nAn incorrect permission preservation vulnerability in Trend Micro Apex One, Apex One as a Service and OfficeScan XG SP1 could allow a remote user to perform an attack and bypass authentication on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-04T23:23:44.000000Z"}]}