This blog contains information about the Trend Micro Apex One & OfficeScan vulnerabilities. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be found at the bottom of this blog.
Update April 22, 2021
16:00 | In August 2020, Trend Micro announced a number of vulnerabilities in their Apex One and OfficeScan products. These vulnerabilities were patched by the company at that time. Trend Micro has recently published an update which advises that the vulnerabilities have now been exploited in the wild.
Reason and background of this blog
This blog contains information about vulnerabilities, the possible risk and advice on how to prevent or limit damage. Below are the possible risks, details and background information.
Potential risk
Below CVE numbers were linked to the vulnerabilities in August 2020:
CVE-2020-24556, CVE-2020-24557, CVE-2020-24558, CVE-2020-24559, CVE-2020-24562
Patches were quickly released and are still available for users who have not yet upgraded the software.
By using these vulnerabilities, an attacker can increase their rights on the system (privilege escalation). This makes it possible to make use of system resources that would not be available to the attacker under normal circumstances.
To exploit these vulnerabilities, an attacker must already have access to the system, either locally or remotely.
Detail info
Below versions/products are vulnerable:
Product | Updated version | Platform |
Apex One (onsite) |
Versions prior to patch 3 b8378 | Windows |
Versions prior to macOS Patch 1 | macOS | |
Apex One (SaaS) |
Versions prior to Aug 2020 Monthly Patch (2008) |
Windows & macOS |
OfficeScan | Versions prior to XG SP1 CP5698 | Windows |
Considering that updates have been available for these vulnerabilities since August last year, the applications should already be patched. In case your systems have not been patched, please update as soon as possible.
For more information, see:
Background
- Zero-day exploits: Exploits waarvoor er nog geen patch is beschikbaar.
Subscribe
Do you want to be informed in time? Sign up for our technical updates
Would you like to receive these critical vulnerabilities by e-mail from now on? Enter your e-mail address below.
Tesorion uses your personal data to send out requested information and possibly for contact by telephone and for marketing and sales purposes. You can change your preferences whenever you want. Read our privacy policy for more information.