ClickySkip to main content
Need help with a cyber incident now?
Call 24/7: +31 88-2747800

Trend Micro Apex One & OfficeScan Vulnerabilities

By 22 April 2021 September 9th, 2021 CERT, SOC, Vulnerability
patchen van kritieke kwetsbaarheden

This blog contains information about the Trend Micro Apex One & OfficeScan vulnerabilities. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be found at the bottom of this blog.

Update April 22, 2021

16:00 | In August 2020, Trend Micro announced a number of vulnerabilities in their Apex One and OfficeScan products. These vulnerabilities were patched by the company at that time. Trend Micro has recently published an update which advises that the vulnerabilities have now been exploited in the wild.

Reason and background of this blog

This blog contains information about vulnerabilities, the possible risk and advice on how to prevent or limit damage. Below are the possible risks, details and background information.

Potential risk

Below CVE numbers were linked to the vulnerabilities in August 2020:

CVE-2020-24556, CVE-2020-24557, CVE-2020-24558, CVE-2020-24559, CVE-2020-24562

Patches were quickly released and are still available for users who have not yet upgraded the software.

By using these vulnerabilities, an attacker can increase their rights on the system (privilege escalation). This makes it possible to make use of system resources that would not be available to the attacker under normal circumstances.

To exploit these vulnerabilities, an attacker must already have access to the system, either locally or remotely.

Detail info

Below versions/products are vulnerable:

Product Updated version Platform
Apex One
Versions prior to patch 3 b8378 Windows
Versions prior to macOS Patch 1 macOS
Apex One
Versions prior to Aug 2020 Monthly Patch
Windows &
OfficeScan Versions prior to XG SP1 CP5698 Windows

Considering that updates have been available for these vulnerabilities since August last year, the applications should already be patched. In case your systems have not been patched, please update as soon as possible.

For more information, see:


  1. Zero-day exploits: Exploits waarvoor er nog geen patch is beschikbaar.


Do you want to be informed in time? Sign up for our technical updates

Would you like to receive these critical vulnerabilities by e-mail from now on? Enter your e-mail address below.

Tesorion uses your personal data to send out requested information and possibly for contact by telephone and for marketing and sales purposes. You can change your preferences whenever you want. Read our privacy policy for more information.