{"id":235136,"date":"2020-09-03T10:33:08","date_gmt":"2020-09-03T08:33:08","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=235136"},"modified":"2020-09-03T10:36:10","modified_gmt":"2020-09-03T08:36:10","slug":"trend-micro-apex-one-und-office-scan-xg-angreifbar","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2020\/09\/03\/trend-micro-apex-one-und-office-scan-xg-angreifbar\/","title":{"rendered":"Trend Micro Apex One und Office Scan XG angreifbar"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\"\/>[English]Administratoren, die die Produkte Apex One, Apex One as a Service (SaaS) und Office Scan XG&nbsp; von Trend Micro als Schutzl\u00f6sung unter Windows und macOS einsetzen, m\u00fcssen handeln. Die Produkte sind \u00fcber vier Schwachstellen angreifbar, ein Update ist aber verf\u00fcgbar. <\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg08.met.vgwort.de\/na\/a957c4412637470f987a9aac436c013e\" width=\"1\" height=\"1\"\/><a href=\"https:\/\/www.trendmicro.com\/de_de\/business\/products\/user-protection\/sps\/endpoint.html?gclid=CjwKCAjwqML6BRAHEiwAdquMnWGxHW0PkxPm-w0GjzlI-K1aBET5f-HcRqRIWlMmVovdKyxgbydsThoCS7AQAvD_BwE\" target=\"_blank\" rel=\"noopener noreferrer\">Apex One<\/a> und Apex One as a Service (SaaS) sind zwei Sicherheitsl\u00f6sungen von Trend Micro, die Endpunkte auf Malware-Befall untersucht und die betreffenden Ger\u00e4te vor Mal- oder Ransomware sch\u00fctzen soll. Office Scan XG von Trend Micro soll ebenfalls Windows-Clients im B\u00fcrobereich vor Schadsoftware sch\u00fctzen. <\/p>\n<h2>Sicherheitshinweis f\u00fcr Trend Micro Apex One <\/h2>\n<p>Zum 1. September 2020 hat Trend Micro den Sicherheitshinweis <a href=\"https:\/\/success.trendmicro.com\/solution\/000263632\" target=\"_blank\" rel=\"noopener noreferrer\">SECURITY BULLETIN: August 2020 Security Bulletin for Trend Micro Apex One and Apex One as a Service<\/a> ver\u00f6ffentlicht. Zum 28. August 2020 wurden Produktaktualisierungen ver\u00f6ffentlicht, die Schwachstellen in Apex One und Apex One as a Service (SaaS) schlie\u00dfen sollen. Dazu schreibt der Hersteller:<\/p>\n<blockquote>\n<p>Trend Micro hat neue Patches f\u00fcr Trend Micro Apex One und Apex One as a Service (SaaS) ver\u00f6ffentlicht.&nbsp; Diese Patches beheben mehrere Schwachstellen im Zusammenhang mit der Eskalation von Hardlink-Privilegien, der unzul\u00e4ssigen Offenlegung von Leseinformationen und unzul\u00e4ssiger Zugriffskontrolle. <\/p>\n<\/blockquote>\n<p>Es werden die Schwachstellen CVE-2020-24556, CVE-2020-24557, CVE-2020-24558 und CVE-2020-24559 geschlossen. Hier ein Auszug mit Details zu den Schwachstellen:<\/p>\n<blockquote>\n<p><b>CVE-2020-24556<\/b>: <b>Trend Micro Apex One Hard Link Privilege Escalation Vulnerability (Windows)<\/b><br \/><i>CVSSv3: 7.8: AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H<\/i><br \/>A vulnerability in Trend Micro Apex One on Microsoft Windows may allow an attacker to create a hard link to any file on the system, which then could be manipulated to gain a privilege escalation and code execution.<br \/>An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.<br \/><i><b>Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected.<\/b><\/i><\/p>\n<p><b>CVE-2020-24557<\/b>:&nbsp; <b>Trend Micro Apex One Improper Access Control Privilege Escalation<\/b><br \/><i>CVSSv3: 7.8: AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H<\/i><br \/>A vulnerability in Trend Micro Apex One on Microsoft Windows may allow an attacker to manipulate a particular product folder to disable the security temporarily, abuse a specific Windows function and attain privilege escalation.<br \/>An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.<br \/><i><b>Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected.<\/b><\/i><\/p>\n<p><b><\/b> <\/p>\n<p><b>CVE-2020-24558<\/b>:&nbsp; <b>Trend Micro Apex One Out-of-Bounds Read Information Disclosure<\/b><br \/><i>CVSSv3: 5.5: AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H<\/i><br \/>A vulnerability in an Trend Micro Apex One dll may allow an attacker to manipulate it to cause an out-of-bounds read that crashes multiple processes in the product.<br \/>An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability<br \/><b><\/b><\/p>\n<p><b>CVE-2020-24559<\/b>:&nbsp; <b>Trend Micro Apex One Hard Link Privilege Escalation Vulnerability (macOS)<\/b><br \/><i>CVSSv3: 7.8: AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H<\/i><br \/>A vulnerability in Trend Micro Apex One on macOS may allow an attacker to manipulate a certain binary to load and run a script from a user-writable folder, which then would allow them to execute arbitrary code as root.<br \/>An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.<br \/><i><b>Please note that the updated macOS client for Apex One (on-premise) is available via Trend Micro's Active<\/b><\/i><\/p>\n<\/blockquote>\n<p>Weitere Details und der Download des Updates ist \u00fcber das <a href=\"https:\/\/success.trendmicro.com\/solution\/000263632\" target=\"_blank\" rel=\"noopener noreferrer\">Security Advisory<\/a> m\u00f6glich. (<a href=\"https:\/\/www.heise.de\/security\/meldung\/Sicherheitsupdates-Schutzsoftware-von-Trend-Micro-kann-PCs-gefaehrden-4883268.html\" target=\"_blank\" rel=\"noopener noreferrer\">via<\/a>)<\/p>\n<h2>Trend Micro OfficeScan XG<\/h2>\n<p>Auch in Trend Micro OfficeScan XG gibt es Schwachstellen, die der Hersteller im Sicherheitshinweis <a href=\"https:\/\/success.trendmicro.com\/solution\/000263633\" target=\"_blank\" rel=\"noopener noreferrer\">SECURITY BULLETIN: Trend Micro OfficeScan XG Hard Link Privilege Escalation Vulnerability<\/a> vom 3. September 2020 offen legt. Trend Micro hat zum 28. August 2020 ebenfalls einen neuen Patch <a href=\"https:\/\/files.trendmicro.com\/products\/officescan\/XG\/SP1\/osce_xg_sp1_win_en_patch3_b5684.exe\" target=\"_blank\" rel=\"noopener noreferrer\">XG SP1 Patch 3 b5684<\/a> f\u00fcr Trend Micro OfficeScan XG SP1 f\u00fcr Windows ver\u00f6ffentlicht. Dieser Patch behebt die Schwachstelle CVE-2020-24556 (Eskalation von Hardlink-Privilegien). Es empfiehlt sich vor einiger Installation aber einen Blick in die Readme-Datei zu werfen und die known issues zu studieren. <\/p>\n<p>Die Schwachstellen werden als hoch bewertet, wobei die Ausnutzung von Hardlink-Privilegien Escalation ab Windows 10 Version 1909 betriebssystemseitig durch einen Patch gestoppt wurde. Weitere Details sind den Sicherheitshinweisen des Herstellers zu entnehmen. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Administratoren, die die Produkte Apex One, Apex One as a Service (SaaS) und Office Scan XG&nbsp; von Trend Micro als Schutzl\u00f6sung unter Windows und macOS einsetzen, m\u00fcssen handeln. Die Produkte sind \u00fcber vier Schwachstellen angreifbar, ein Update ist aber verf\u00fcgbar.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1063,426,7459,185,161,301],"tags":[6664,4328,4315,4313],"class_list":["post-235136","post","type-post","status-publish","format-standard","hentry","category-mac-os-x","category-sicherheit","category-software","category-update","category-virenschutz","category-windows","tag-schwachstelle","tag-sicherheit","tag-update","tag-virenschutz"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/235136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=235136"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/235136\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=235136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=235136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=235136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}