Action not permitted
Modal body text goes here.
jvndb-2023-002100
Vulnerability from jvndb
Published
2023-06-14 14:47
Modified
2024-05-23 15:23
Severity ?
Summary
Security updates for multiple Trend Micro products for enterprises (June 2023)
Details
Trend Micro Incorporated has released security updates for multiple Trend Micro products for enterprises. For more details, refer to the information provided by the developer.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.
References
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002100.html", "dc:date": "2024-05-23T15:23+09:00", "dcterms:issued": "2023-06-14T14:47+09:00", "dcterms:modified": "2024-05-23T15:23+09:00", "description": "Trend Micro Incorporated has released security updates for multiple Trend Micro products for enterprises. For more details, refer to the information provided by the developer.\r\n\r\nTrend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.", "link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002100.html", "sec:cpe": [ { "#text": "cpe:/a:trendmicro:apex_central", "@product": "Apex Central", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:apex_one", "@product": "Apex One", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:mobile_security", "@product": "Trend Micro Mobile Security", "@vendor": "Trend Micro, Inc.", "@version": "2.2" } ], "sec:cvss": { "@score": "9.8", "@severity": "Critical", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2023-002100", "sec:references": [ { "#text": "https://jvn.jp/en/vu/JVNVU91852506/", "@id": "JVNVU#91852506", "@source": "JVN" }, { "#text": "https://jvn.jp/en/vu/JVNVU93384719/index.html", "@id": "JVNVU#93384719", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32521", "@id": "CVE-2023-32521", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32522", "@id": "CVE-2023-32522", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32523", "@id": "CVE-2023-32523", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32524", "@id": "CVE-2023-32524", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32525", "@id": "CVE-2023-32525", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32526", "@id": "CVE-2023-32526", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32527", "@id": "CVE-2023-32527", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32528", "@id": "CVE-2023-32528", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-30902", "@id": "CVE-2023-30902", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32552", "@id": "CVE-2023-32552", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32553", "@id": "CVE-2023-32553", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32554", "@id": "CVE-2023-32554", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32555", "@id": "CVE-2023-32555", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32556", "@id": "CVE-2023-32556", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32557", "@id": "CVE-2023-32557", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34144", "@id": "CVE-2023-34144", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34145", "@id": "CVE-2023-34145", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34146", "@id": "CVE-2023-34146", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34147", "@id": "CVE-2023-34147", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34148", "@id": "CVE-2023-34148", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32529", "@id": "CVE-2023-32529", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32530", "@id": "CVE-2023-32530", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32531", "@id": "CVE-2023-32531", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32532", "@id": "CVE-2023-32532", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32533", "@id": "CVE-2023-32533", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32534", "@id": "CVE-2023-32534", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32535", "@id": "CVE-2023-32535", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32536", "@id": "CVE-2023-32536", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32537", "@id": "CVE-2023-32537", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32604", "@id": "CVE-2023-32604", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32605", "@id": "CVE-2023-32605", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-30902", "@id": "CVE-2023-30902", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32521", "@id": "CVE-2023-32521", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32522", "@id": "CVE-2023-32522", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32523", "@id": "CVE-2023-32523", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32524", "@id": "CVE-2023-32524", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32525", "@id": "CVE-2023-32525", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32526", "@id": "CVE-2023-32526", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32527", "@id": "CVE-2023-32527", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32528", "@id": "CVE-2023-32528", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32552", "@id": "CVE-2023-32552", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32553", "@id": "CVE-2023-32553", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32554", "@id": "CVE-2023-32554", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32555", "@id": "CVE-2023-32555", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32556", "@id": "CVE-2023-32556", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32557", "@id": "CVE-2023-32557", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34144", "@id": "CVE-2023-34144", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34145", "@id": "CVE-2023-34145", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34146", "@id": "CVE-2023-34146", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34147", "@id": "CVE-2023-34147", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32529", "@id": "CVE-2023-32529", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32530", "@id": "CVE-2023-32530", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32531", "@id": "CVE-2023-32531", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32532", "@id": "CVE-2023-32532", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32533", "@id": "CVE-2023-32533", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32534", "@id": "CVE-2023-32534", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32535", "@id": "CVE-2023-32535", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32536", "@id": "CVE-2023-32536", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32537", "@id": "CVE-2023-32537", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32604", "@id": "CVE-2023-32604", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32605", "@id": "CVE-2023-32605", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34148", "@id": "CVE-2023-34148", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-22", "@title": "Path Traversal(CWE-22)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-287", "@title": "Improper Authentication(CWE-287)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-noinfo", "@title": "No Mapping(CWE-noinfo)" }, { "#text": "https://cwe.mitre.org/data/definitions/367.html", "@id": "CWE-367", "@title": "Time-of-check Time-of-use (TOCTOU) Race Condition(CWE-367)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-59", "@title": "Link Following(CWE-59)" }, { "#text": "https://cwe.mitre.org/data/definitions/426.html", "@id": "CWE-426", "@title": "Untrusted Search Path(CWE-426)" }, { "#text": "https://cwe.mitre.org/data/definitions/269.html", "@id": "CWE-269", "@title": "Improper Privilege Management(CWE-269)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-89", "@title": "SQL Injection(CWE-89)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "Security updates for multiple Trend Micro products for enterprises (June 2023)" }
cve-2023-34147
Vulnerability from cvelistv5
Published
2023-06-26 21:58
Modified
2024-12-04 16:08
Severity ?
EPSS score ?
Summary
An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is a similar, but not identical vulnerability as CVE-2023-34146 and CVE-2023-34148.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.154Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-833/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:trend_micro_inc:trend_micro_apex_one:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "trend_micro_apex_one", "vendor": "trend_micro_inc", "versions": [ { "lessThan": "14.0.0.12033", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-34147", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T15:56:00.905876Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:08:11.976Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.12033", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\r\n\r\nThis is a similar, but not identical vulnerability as CVE-2023-34146 and CVE-2023-34148." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:58:09.816Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-833/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-34147", "datePublished": "2023-06-26T21:58:09.816Z", "dateReserved": "2023-05-26T18:41:36.333Z", "dateUpdated": "2024-12-04T16:08:11.976Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32554
Vulnerability from cvelistv5
Published
2023-06-26 21:56
Modified
2024-12-04 21:25
Severity ?
EPSS score ?
Summary
A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations.
Please note: a local attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is similar to, but not identical to CVE-2023-32555.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.803Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-657/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:trend_micro_inc:trend_micro_apex_one:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "trend_micro_apex_one", "vendor": "trend_micro_inc", "versions": [ { "lessThan": "14.0.0.12024", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-32554", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T21:25:04.264007Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T21:25:50.212Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.12024", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations.\r\n\r\nPlease note: a local attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\r\n\r\nThis is similar to, but not identical to CVE-2023-32555." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:56:27.443Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-657/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32554", "datePublished": "2023-06-26T21:56:27.443Z", "dateReserved": "2023-05-09T18:13:30.118Z", "dateUpdated": "2024-12-04T21:25:50.212Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34144
Vulnerability from cvelistv5
Published
2023-06-26 21:57
Modified
2024-12-05 14:38
Severity ?
EPSS score ?
Summary
An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate their privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is a similar, but not identical vulnerability as CVE-2023-34145.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.224Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-835/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:trend_micro_inc:trend_micro_apex_one:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "trend_micro_apex_one", "vendor": "trend_micro_inc", "versions": [ { "lessThan": "14.0.0.12033", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-34144", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-05T14:37:30.691198Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-05T14:38:19.835Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.12033", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate their privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\r\n\r\nThis is a similar, but not identical vulnerability as CVE-2023-34145." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:57:41.700Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-835/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-34144", "datePublished": "2023-06-26T21:57:41.700Z", "dateReserved": "2023-05-26T18:41:36.332Z", "dateUpdated": "2024-12-05T14:38:19.835Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32526
Vulnerability from cvelistv5
Published
2023-06-26 21:53
Modified
2024-12-04 16:50
Severity ?
EPSS score ?
Summary
Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widget vulnerabilities that could allow a remote attacker to create arbitrary files on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is similar to, but not identical to CVE-2023-32525.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Moibile Security for Enterprise |
Version: 9.8 SP5 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.093Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-586/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32526", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T16:50:36.922616Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:50:41.486Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Moibile Security for Enterprise", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "9.8.3294", "status": "affected", "version": "9.8 SP5", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widget vulnerabilities that could allow a remote attacker to create arbitrary files on affected installations. \r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\r\n\r\nThis is similar to, but not identical to CVE-2023-32525." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:53:56.403Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-586/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32526", "datePublished": "2023-06-26T21:53:56.403Z", "dateReserved": "2023-05-09T16:41:52.157Z", "dateUpdated": "2024-12-04T16:50:41.486Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32531
Vulnerability from cvelistv5
Published
2023-06-26 21:54
Modified
2024-10-21 21:12
Severity ?
EPSS score ?
Summary
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.
This is similar to, but not identical to CVE-2023-32532 through 32535.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 (8.0) ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.625Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-724/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32531", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-21T21:07:13.825127Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-21T21:12:30.477Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6394", "status": "affected", "version": "2019 (8.0)", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.\r\n\r\nThis is similar to, but not identical to CVE-2023-32532 through 32535." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:54:44.284Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-724/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32531", "datePublished": "2023-06-26T21:54:44.284Z", "dateReserved": "2023-05-09T17:30:26.267Z", "dateUpdated": "2024-10-21T21:12:30.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32525
Vulnerability from cvelistv5
Published
2023-06-26 21:53
Modified
2024-12-05 14:44
Severity ?
EPSS score ?
Summary
Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widget vulnerabilities that could allow a remote attacker to create arbitrary files on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is similar to, but not identical to CVE-2023-32526.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Moibile Security for Enterprise |
Version: 9.8 SP5 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-589/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32525", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-05T14:43:24.300979Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-05T14:44:11.782Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Moibile Security for Enterprise", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "9.8.3294", "status": "affected", "version": "9.8 SP5", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widget vulnerabilities that could allow a remote attacker to create arbitrary files on affected installations. \r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\r\n\r\nThis is similar to, but not identical to CVE-2023-32526." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:53:44.335Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-589/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32525", "datePublished": "2023-06-26T21:53:44.335Z", "dateReserved": "2023-05-09T16:41:52.156Z", "dateUpdated": "2024-12-05T14:44:11.782Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32557
Vulnerability from cvelistv5
Published
2023-06-26 21:57
Modified
2024-12-04 21:16
Severity ?
EPSS score ?
Summary
A path traversal vulnerability in the Trend Micro Apex One and Apex One as a Service could allow an unauthenticated attacker to upload an arbitrary file to the Management Server which could lead to remote code execution with system privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.609Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:trend_micro_inc:trend_micro_apex_one:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "trend_micro_apex_one", "vendor": "trend_micro_inc", "versions": [ { "lessThan": "14.0.0.12024", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-32557", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T21:13:05.087058Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T21:16:16.359Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.12024", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability in the Trend Micro Apex One and Apex One as a Service could allow an unauthenticated attacker to upload an arbitrary file to the Management Server which could lead to remote code execution with system privileges." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:57:00.765Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32557", "datePublished": "2023-06-26T21:57:00.765Z", "dateReserved": "2023-05-09T19:01:16.631Z", "dateUpdated": "2024-12-04T21:16:16.359Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32530
Vulnerability from cvelistv5
Published
2023-06-26 21:54
Modified
2024-12-04 16:36
Severity ?
EPSS score ?
Summary
Vulnerable modules of Trend Micro Apex Central (on-premise) contain vulnerabilities which would allow authenticated users to perform a SQL injection that could lead to remote code execution.
Please note: an attacker must first obtain authentication on the target system in order to exploit these vulnerabilities.
This is similar to, but not identical to CVE-2023-32529.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 (8.0) ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.832Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-654/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32530", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T16:36:31.954171Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:36:39.921Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6394", "status": "affected", "version": "2019 (8.0)", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerable modules of Trend Micro Apex Central (on-premise) contain vulnerabilities which would allow authenticated users to perform a SQL injection that could lead to remote code execution.\r\n\r\nPlease note: an attacker must first obtain authentication on the target system in order to exploit these vulnerabilities.\r\n\r\nThis is similar to, but not identical to CVE-2023-32529." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:54:34.814Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-654/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32530", "datePublished": "2023-06-26T21:54:34.814Z", "dateReserved": "2023-05-09T17:30:26.267Z", "dateUpdated": "2024-12-04T16:36:39.921Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32555
Vulnerability from cvelistv5
Published
2023-06-26 21:56
Modified
2024-12-04 21:24
Severity ?
EPSS score ?
Summary
A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations.
Please note: a local attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is similar to, but not identical to CVE-2023-32554.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.631Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-656/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:trend_micro_inc:trend_micro_apex_one:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "trend_micro_apex_one", "vendor": "trend_micro_inc", "versions": [ { "lessThan": "14.0.0.12024", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-32555", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T21:22:55.412689Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T21:24:00.254Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.12024", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations.\r\n\r\nPlease note: a local attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\r\n\r\nThis is similar to, but not identical to CVE-2023-32554." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:56:37.560Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-656/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32555", "datePublished": "2023-06-26T21:56:37.560Z", "dateReserved": "2023-05-09T18:13:30.118Z", "dateUpdated": "2024-12-04T21:24:00.254Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32532
Vulnerability from cvelistv5
Published
2023-06-26 21:54
Modified
2024-10-21 21:12
Severity ?
EPSS score ?
Summary
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.
This is similar to, but not identical to CVE-2023-32531 through 32535.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 (8.0) ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.784Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-723/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32532", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-21T21:07:12.440248Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-21T21:12:23.691Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6394", "status": "affected", "version": "2019 (8.0)", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.\r\n\r\nThis is similar to, but not identical to CVE-2023-32531 through 32535." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:54:53.585Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-723/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32532", "datePublished": "2023-06-26T21:54:53.585Z", "dateReserved": "2023-05-09T17:30:26.267Z", "dateUpdated": "2024-10-21T21:12:23.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32556
Vulnerability from cvelistv5
Published
2023-06-26 21:56
Modified
2024-12-04 21:19
Severity ?
EPSS score ?
Summary
A link following vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to disclose sensitive information.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-651/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32556", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T21:19:11.808178Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T21:19:21.403Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.12024", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A link following vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to disclose sensitive information.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:56:48.500Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-651/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32556", "datePublished": "2023-06-26T21:56:48.500Z", "dateReserved": "2023-05-09T18:13:30.119Z", "dateUpdated": "2024-12-04T21:19:21.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32522
Vulnerability from cvelistv5
Published
2023-06-26 21:53
Modified
2024-12-04 17:11
Severity ?
EPSS score ?
Summary
A path traversal exists in a specific dll of Trend Micro Mobile Security (Enterprise) 9.8 SP5 which could allow an authenticated remote attacker to delete arbitrary files.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Moibile Security for Enterprise |
Version: 9.8 SP5 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.tenable.com/security/research/tra-2023-17" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32522", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T17:11:34.148913Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T17:11:40.884Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Moibile Security for Enterprise", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "9.8.3294", "status": "affected", "version": "9.8 SP5", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A path traversal exists in a specific dll of Trend Micro Mobile Security (Enterprise) 9.8 SP5 which could allow an authenticated remote attacker to delete arbitrary files.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:53:08.914Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US" }, { "url": "https://www.tenable.com/security/research/tra-2023-17" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32522", "datePublished": "2023-06-26T21:53:08.914Z", "dateReserved": "2023-05-09T16:41:52.156Z", "dateUpdated": "2024-12-04T17:11:40.884Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32536
Vulnerability from cvelistv5
Published
2023-06-26 21:55
Modified
2024-10-21 21:11
Severity ?
EPSS score ?
Summary
Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues.
Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.
This is similar to, but not identical to CVE-2023-32537.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 (8.0) ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.517Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32536", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-21T21:07:07.292197Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-21T21:11:51.501Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6394", "status": "affected", "version": "2019 (8.0)", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. \r\n\r\nPlease note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.\r\n\r\nThis is similar to, but not identical to CVE-2023-32537." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:55:34.961Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32536", "datePublished": "2023-06-26T21:55:34.961Z", "dateReserved": "2023-05-09T17:30:26.268Z", "dateUpdated": "2024-10-21T21:11:51.501Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32534
Vulnerability from cvelistv5
Published
2023-06-26 21:55
Modified
2024-10-21 21:12
Severity ?
EPSS score ?
Summary
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.
This is similar to, but not identical to CVE-2023-32531 through 32535.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 (8.0) ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-725/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32534", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-21T21:07:09.772373Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-21T21:12:08.711Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6394", "status": "affected", "version": "2019 (8.0)", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.\r\n\r\nThis is similar to, but not identical to CVE-2023-32531 through 32535." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:55:09.605Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-725/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32534", "datePublished": "2023-06-26T21:55:09.605Z", "dateReserved": "2023-05-09T17:30:26.268Z", "dateUpdated": "2024-10-21T21:12:08.711Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32523
Vulnerability from cvelistv5
Published
2023-06-26 21:53
Modified
2024-12-05 15:21
Severity ?
EPSS score ?
Summary
Affected versions of Trend Micro Mobile Security (Enterprise) 9.8 SP5 contain some widgets that would allow a remote user to bypass authentication and potentially chain with other vulnerabilities.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities.
This is similar to, but not identical to CVE-2023-32524.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Moibile Security for Enterprise |
Version: 9.8 SP5 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.620Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-587/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32523", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T17:19:22.720445Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-05T15:21:04.987Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Moibile Security for Enterprise", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "9.8.3294", "status": "affected", "version": "9.8 SP5", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected versions of Trend Micro Mobile Security (Enterprise) 9.8 SP5 contain some widgets that would allow a remote user to bypass authentication and potentially chain with other vulnerabilities.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities.\r\n\r\nThis is similar to, but not identical to CVE-2023-32524." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:53:22.785Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-587/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32523", "datePublished": "2023-06-26T21:53:22.785Z", "dateReserved": "2023-05-09T16:41:52.156Z", "dateUpdated": "2024-12-05T15:21:04.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32553
Vulnerability from cvelistv5
Published
2023-06-26 21:56
Modified
2024-12-04 16:23
Severity ?
EPSS score ?
Summary
An Improper access control vulnerability in Trend Micro Apex One and Apex One as a Service could allow an unauthenticated user under certain circumstances to disclose sensitive information on agents.
This is similar to, but not identical to CVE-2023-32552.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-653/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:trend_micro_inc:trend_micro_apex_one:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "trend_micro_apex_one", "vendor": "trend_micro_inc", "versions": [ { "lessThan": "14.0.0.12024", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-32553", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T16:17:26.852354Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-346", "description": "CWE-346 Origin Validation Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:23:57.330Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.12024", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An Improper access control vulnerability in Trend Micro Apex One and Apex One as a Service could allow an unauthenticated user under certain circumstances to disclose sensitive information on agents.\r\n\r\nThis is similar to, but not identical to CVE-2023-32552." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:56:16.388Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-653/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32553", "datePublished": "2023-06-26T21:56:16.388Z", "dateReserved": "2023-05-09T18:13:30.118Z", "dateUpdated": "2024-12-04T16:23:57.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32535
Vulnerability from cvelistv5
Published
2023-06-26 21:55
Modified
2024-10-21 21:12
Severity ?
EPSS score ?
Summary
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.
This is similar to, but not identical to CVE-2023-32531 through 32534.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 (8.0) ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.630Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-857/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32535", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-21T21:07:08.495935Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-21T21:12:01.712Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6394", "status": "affected", "version": "2019 (8.0)", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.\r\n\r\nThis is similar to, but not identical to CVE-2023-32531 through 32534." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:55:24.726Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-857/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32535", "datePublished": "2023-06-26T21:55:24.726Z", "dateReserved": "2023-05-09T17:30:26.268Z", "dateUpdated": "2024-10-21T21:12:01.712Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32605
Vulnerability from cvelistv5
Published
2023-06-26 21:57
Modified
2024-12-05 14:39
Severity ?
EPSS score ?
Summary
Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues.
Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.
This is similar to, but not identical to CVE-2023-32604.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 (8.0) ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:35.498Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32605", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-05T14:39:47.836320Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-05T14:39:59.932Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6394", "status": "affected", "version": "2019 (8.0)", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. \r\n\r\nPlease note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.\r\n\r\nThis is similar to, but not identical to CVE-2023-32604." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:57:26.284Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32605", "datePublished": "2023-06-26T21:57:26.284Z", "dateReserved": "2023-05-10T22:50:37.573Z", "dateUpdated": "2024-12-05T14:39:59.932Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32529
Vulnerability from cvelistv5
Published
2023-06-26 21:54
Modified
2024-12-04 16:39
Severity ?
EPSS score ?
Summary
Vulnerable modules of Trend Micro Apex Central (on-premise) contain vulnerabilities which would allow authenticated users to perform a SQL injection that could lead to remote code execution.
Please note: an attacker must first obtain authentication on the target system in order to exploit these vulnerabilities.
This is similar to, but not identical to CVE-2023-32530.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 (8.0) ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.782Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-652/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32529", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T16:39:23.042626Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:39:31.909Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6394", "status": "affected", "version": "2019 (8.0)", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerable modules of Trend Micro Apex Central (on-premise) contain vulnerabilities which would allow authenticated users to perform a SQL injection that could lead to remote code execution.\r\n\r\nPlease note: an attacker must first obtain authentication on the target system in order to exploit these vulnerabilities.\r\n\r\nThis is similar to, but not identical to CVE-2023-32530." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:54:23.502Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-652/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32529", "datePublished": "2023-06-26T21:54:23.502Z", "dateReserved": "2023-05-09T17:30:26.267Z", "dateUpdated": "2024-12-04T16:39:31.909Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32552
Vulnerability from cvelistv5
Published
2023-06-26 21:56
Modified
2024-12-04 16:32
Severity ?
EPSS score ?
Summary
An Improper access control vulnerability in Trend Micro Apex One and Apex One as a Service could allow an unauthenticated user under certain circumstances to disclose sensitive information on agents.
This is similar to, but not identical to CVE-2023-32553
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.626Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-655/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:trend_micro_inc:trend_micro_apex_one:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "trend_micro_apex_one", "vendor": "trend_micro_inc", "versions": [ { "lessThan": "14.0.0.12024", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-32552", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T16:32:05.520192Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:32:13.213Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.12024", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An Improper access control vulnerability in Trend Micro Apex One and Apex One as a Service could allow an unauthenticated user under certain circumstances to disclose sensitive information on agents.\r\n\r\nThis is similar to, but not identical to CVE-2023-32553" } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:56:06.010Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-655/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32552", "datePublished": "2023-06-26T21:56:06.010Z", "dateReserved": "2023-05-09T18:13:30.118Z", "dateUpdated": "2024-12-04T16:32:13.213Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32533
Vulnerability from cvelistv5
Published
2023-06-26 21:55
Modified
2024-10-21 21:12
Severity ?
EPSS score ?
Summary
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.
This is similar to, but not identical to CVE-2023-32531 through 32535.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 (8.0) ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.626Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-726/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32533", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-21T21:07:10.978210Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-21T21:12:14.351Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6394", "status": "affected", "version": "2019 (8.0)", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.\r\n\r\nThis is similar to, but not identical to CVE-2023-32531 through 32535." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:55:02.411Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-726/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32533", "datePublished": "2023-06-26T21:55:02.411Z", "dateReserved": "2023-05-09T17:30:26.267Z", "dateUpdated": "2024-10-21T21:12:14.351Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32604
Vulnerability from cvelistv5
Published
2023-06-26 21:57
Modified
2024-10-21 21:11
Severity ?
EPSS score ?
Summary
Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues.
Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.
This is similar to, but not identical to CVE-2023-32605.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 (8.0) ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:35.673Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32604", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-21T21:07:04.618480Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-21T21:11:38.297Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6394", "status": "affected", "version": "2019 (8.0)", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. \r\n\r\nPlease note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.\r\n\r\nThis is similar to, but not identical to CVE-2023-32605." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:57:14.354Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32604", "datePublished": "2023-06-26T21:57:14.354Z", "dateReserved": "2023-05-10T22:50:37.572Z", "dateUpdated": "2024-10-21T21:11:38.297Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34148
Vulnerability from cvelistv5
Published
2023-06-26 21:58
Modified
2024-12-04 16:07
Severity ?
EPSS score ?
Summary
An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is a similar, but not identical vulnerability as CVE-2023-34146 and CVE-2023-34147.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.096Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-834/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:trend_micro_inc:trend_micro_apex_one:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "trend_micro_apex_one", "vendor": "trend_micro_inc", "versions": [ { "lessThan": "14.0.0.12033", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-34148", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T15:52:36.935424Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:07:28.628Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.12033", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\r\n\r\nThis is a similar, but not identical vulnerability as CVE-2023-34146 and CVE-2023-34147." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:58:19.771Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-834/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-34148", "datePublished": "2023-06-26T21:58:19.771Z", "dateReserved": "2023-05-26T18:41:36.333Z", "dateUpdated": "2024-12-04T16:07:28.628Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32537
Vulnerability from cvelistv5
Published
2023-06-26 21:55
Modified
2024-10-21 21:11
Severity ?
EPSS score ?
Summary
Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues.
Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.
This is similar to, but not identical to CVE-2023-32536.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex Central |
Version: 2019 (8.0) ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32537", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-21T21:07:05.878826Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-21T21:11:44.863Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.0.6394", "status": "affected", "version": "2019 (8.0)", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. \r\n\r\nPlease note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.\r\n\r\nThis is similar to, but not identical to CVE-2023-32536." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:55:43.951Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32537", "datePublished": "2023-06-26T21:55:43.951Z", "dateReserved": "2023-05-09T17:30:26.269Z", "dateUpdated": "2024-10-21T21:11:44.863Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32528
Vulnerability from cvelistv5
Published
2023-06-26 21:54
Modified
2024-12-04 16:41
Severity ?
EPSS score ?
Summary
Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains vulnerable .php files that could allow a remote attacker to execute arbitrary code on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is similar to, but not identical to CVE-2023-32527.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Moibile Security for Enterprise |
Version: 9.8 SP5 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.785Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-591/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32528", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T16:39:50.442008Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:41:15.502Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Moibile Security for Enterprise", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "9.8.3294", "status": "affected", "version": "9.8 SP5", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains vulnerable .php files that could allow a remote attacker to execute arbitrary code on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\r\n\r\nThis is similar to, but not identical to CVE-2023-32527." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:54:13.506Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-591/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32528", "datePublished": "2023-06-26T21:54:13.506Z", "dateReserved": "2023-05-09T16:41:52.157Z", "dateUpdated": "2024-12-04T16:41:15.502Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-30902
Vulnerability from cvelistv5
Published
2023-06-26 21:52
Modified
2024-12-05 14:48
Severity ?
EPSS score ?
Summary
A privilege escalation vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to unintentionally delete privileged Trend Micro registry keys including its own protected registry keys on affected installations.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:37:15.498Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-30902", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-05T14:47:47.871075Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-05T14:48:28.726Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.12024", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A privilege escalation vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to unintentionally delete privileged Trend Micro registry keys including its own protected registry keys on affected installations." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:52:39.860Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-30902", "datePublished": "2023-06-26T21:52:39.860Z", "dateReserved": "2023-04-20T16:13:07.652Z", "dateUpdated": "2024-12-05T14:48:28.726Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32521
Vulnerability from cvelistv5
Published
2023-06-26 21:52
Modified
2024-12-05 14:45
Severity ?
EPSS score ?
Summary
A path traversal exists in a specific service dll of Trend Micro Mobile Security (Enterprise) 9.8 SP5 which could allow an unauthenticated remote attacker to delete arbitrary files.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Moibile Security for Enterprise |
Version: 9.8 SP5 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.785Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.tenable.com/security/research/tra-2023-17" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32521", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-05T14:45:41.411361Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-05T14:45:54.617Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Moibile Security for Enterprise", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "9.8.3294", "status": "affected", "version": "9.8 SP5", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A path traversal exists in a specific service dll of Trend Micro Mobile Security (Enterprise) 9.8 SP5 which could allow an unauthenticated remote attacker to delete arbitrary files." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:52:58.464Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US" }, { "url": "https://www.tenable.com/security/research/tra-2023-17" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32521", "datePublished": "2023-06-26T21:52:58.464Z", "dateReserved": "2023-05-09T16:41:52.156Z", "dateUpdated": "2024-12-05T14:45:54.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32524
Vulnerability from cvelistv5
Published
2023-06-26 21:53
Modified
2024-12-05 15:20
Severity ?
EPSS score ?
Summary
Affected versions of Trend Micro Mobile Security (Enterprise) 9.8 SP5 contain some widgets that would allow a remote user to bypass authentication and potentially chain with other vulnerabilities.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities.
This is similar to, but not identical to CVE-2023-32523.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Moibile Security for Enterprise |
Version: 9.8 SP5 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:38.247Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-588/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32524", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T18:29:28.457193Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-05T15:20:38.837Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Moibile Security for Enterprise", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "9.8.3294", "status": "affected", "version": "9.8 SP5", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected versions of Trend Micro Mobile Security (Enterprise) 9.8 SP5 contain some widgets that would allow a remote user to bypass authentication and potentially chain with other vulnerabilities.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities.\r\n\r\nThis is similar to, but not identical to CVE-2023-32523." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:53:33.392Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-588/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32524", "datePublished": "2023-06-26T21:53:33.392Z", "dateReserved": "2023-05-09T16:41:52.156Z", "dateUpdated": "2024-12-05T15:20:38.837Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32527
Vulnerability from cvelistv5
Published
2023-06-26 21:54
Modified
2024-12-04 16:47
Severity ?
EPSS score ?
Summary
Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains vulnerable .php files that could allow a remote attacker to execute arbitrary code on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is similar to, but not identical to CVE-2023-32528.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Moibile Security for Enterprise |
Version: 9.8 SP5 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.604Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-590/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32527", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T16:47:23.094844Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:47:57.157Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Moibile Security for Enterprise", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "9.8.3294", "status": "affected", "version": "9.8 SP5", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains vulnerable .php files that could allow a remote attacker to execute arbitrary code on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\r\n\r\nThis is similar to, but not identical to CVE-2023-32528." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:54:06.329Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-590/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-32527", "datePublished": "2023-06-26T21:54:06.329Z", "dateReserved": "2023-05-09T16:41:52.157Z", "dateUpdated": "2024-12-04T16:47:57.157Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34146
Vulnerability from cvelistv5
Published
2023-06-26 21:58
Modified
2024-12-04 16:08
Severity ?
EPSS score ?
Summary
An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is a similar, but not identical vulnerability as CVE-2023-34147 and CVE-2023-34148.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:53.711Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-832/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:trend_micro_inc:trend_micro_apex_one:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "trend_micro_apex_one", "vendor": "trend_micro_inc", "versions": [ { "lessThan": "14.0.0.12033", "status": "affected", "version": "2019", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-34146", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T15:58:14.280059Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:08:55.833Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.12033", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\r\n\r\nThis is a similar, but not identical vulnerability as CVE-2023-34147 and CVE-2023-34148." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:58:00.477Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-832/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-34146", "datePublished": "2023-06-26T21:58:00.477Z", "dateReserved": "2023-05-26T18:41:36.333Z", "dateUpdated": "2024-12-04T16:08:55.833Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34145
Vulnerability from cvelistv5
Published
2023-06-26 21:57
Modified
2024-12-05 14:33
Severity ?
EPSS score ?
Summary
An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate their privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is a similar, but not identical vulnerability as CVE-2023-34144.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.091Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-836/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:trend_micro_inc:trend_micro_apex_one:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "trend_micro_apex_one", "vendor": "trend_micro_inc", "versions": [ { "lessThan": "14.0.0.12033", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-34145", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-05T14:32:22.111881Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-05T14:33:33.347Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.12033", "status": "affected", "version": "2019", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate their privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\r\n\r\nThis is a similar, but not identical vulnerability as CVE-2023-34144." } ], "providerMetadata": { "dateUpdated": "2023-06-26T21:57:50.324Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-836/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2023-34145", "datePublished": "2023-06-26T21:57:50.324Z", "dateReserved": "2023-05-26T18:41:36.333Z", "dateUpdated": "2024-12-05T14:33:33.347Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.