{"id":15554,"date":"2020-09-04T00:03:00","date_gmt":"2020-09-03T22:03:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=15554"},"modified":"2020-09-03T12:01:36","modified_gmt":"2020-09-03T10:01:36","slug":"trend-micro-apex-one-und-office-scan-xg-angreifbar","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/09\/04\/trend-micro-apex-one-und-office-scan-xg-angreifbar\/","title":{"rendered":"Trend Micro Apex One and Office Scan XG vulnerable"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/09\/03\/trend-micro-apex-one-und-office-scan-xg-angreifbar\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]Administrators using Trend Micro's Apex One, Apex One as a Service (SaaS) and Office Scan XG products as a protection solution on Windows and macOS need to act. The products are vulnerable through four vulnerabilities, but an update is available. <\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg08.met.vgwort.de\/na\/a957c4412637470f987a9aac436c013e\" width=\"1\" height=\"1\"><a href=\"https:\/\/www.trendmicro.com\/de_de\/business\/products\/user-protection\/sps\/endpoint.html?gclid=CjwKCAjwqML6BRAHEiwAdquMnWGxHW0PkxPm-w0GjzlI-K1aBET5f-HcRqRIWlMmVovdKyxgbydsThoCS7AQAvD_BwE\" target=\"_blank\" rel=\"noopener noreferrer\">Apex One<\/a> and Apex One as a Service (SaaS) are two security solutions from Trend Micro that scan endpoints for malware infection and protect the relevant devices against malware or ransomware. Office Scan XG from Trend Micro is also designed to protect Windows clients in the office from malware. <\/p>\n<h2>Security Advice for Trend Micro Apex One <\/h2>\n<p>As of September 1, 2020, Trend Micro has released <a href=\"https:\/\/success.trendmicro.com\/solution\/000263632\" target=\"_blank\" rel=\"noopener noreferrer\">SECURITY BULLETIN: August 2020 Security Bulletin for Trend Micro Apex One and Apex One as a Service<\/a>. Product updates were released on August 28, 2020 to address vulnerabilities in Apex One and Apex One as a Service (SaaS). The manufacturer writes about this:<\/p>\n<blockquote>\n<p>Trend Micro has released new patches for Trend Micro Apex One and Apex One as a Service (SaaS).&nbsp; These patches address several vulnerabilities related to the escalation of hardlink privileges, improper read disclosure and improper access control. <\/p>\n<\/blockquote>\n<p>The vulnerabilities CVE-2020-24556, CVE-2020-24557, CVE-2020-24558 and CVE-2020-24559 are closed. Here is an excerpt with details about the vulnerabilities:<\/p>\n<blockquote>\n<p><b>CVE-2020-24556<\/b>: <b>Trend Micro Apex One Hard Link Privilege Escalation Vulnerability (Windows)<\/b><br \/><i>CVSSv3: 7.8: AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H<\/i><br \/>A vulnerability in Trend Micro Apex One on Microsoft Windows may allow an attacker to create a hard link to any file on the system, which then could be manipulated to gain a privilege escalation and code execution.<br \/>An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.<br \/><i><b>Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected.<\/b><\/i><\/p>\n<p><b>CVE-2020-24557<\/b>:&nbsp; <b>Trend Micro Apex One Improper Access Control Privilege Escalation<\/b><br \/><i>CVSSv3: 7.8: AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H<\/i><br \/>A vulnerability in Trend Micro Apex One on Microsoft Windows may allow an attacker to manipulate a particular product folder to disable the security temporarily, abuse a specific Windows function and attain privilege escalation.<br \/>An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.<br \/><i><b>Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected.<\/b><\/i><\/p>\n<p><b><\/b> <\/p>\n<p><b>CVE-2020-24558<\/b>:&nbsp; <b>Trend Micro Apex One Out-of-Bounds Read Information Disclosure<\/b><br \/><i>CVSSv3: 5.5: AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H<\/i><br \/>A vulnerability in an Trend Micro Apex One dll may allow an attacker to manipulate it to cause an out-of-bounds read that crashes multiple processes in the product.<br \/>An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability<br \/><b><\/b><\/p>\n<p><b>CVE-2020-24559<\/b>:&nbsp; <b>Trend Micro Apex One Hard Link Privilege Escalation Vulnerability (macOS)<\/b><br \/><i>CVSSv3: 7.8: AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H<\/i><br \/>A vulnerability in Trend Micro Apex One on macOS may allow an attacker to manipulate a certain binary to load and run a script from a user-writable folder, which then would allow them to execute arbitrary code as root.<br \/>An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.<br \/><i><b>Please note that the updated macOS client for Apex One (on-premise) is available via Trend Micro's Active<\/b><\/i><\/p>\n<\/blockquote>\n<p>Further details and the download of the update is possible via the <a href=\"https:\/\/success.trendmicro.com\/solution\/000263632\" target=\"_blank\" rel=\"noopener noreferrer\">Security Advisory<\/a>. (<a href=\"https:\/\/www.heise.de\/security\/meldung\/Sicherheitsupdates-Schutzsoftware-von-Trend-Micro-kann-PCs-gefaehrden-4883268.html\" target=\"_blank\" rel=\"noopener noreferrer\">via<\/a>)<\/p>\n<h2>Trend Micro OfficeScan XG<\/h2>\n<p>There are also vulnerabilities in Trend Micro OfficeScan XG, which the manufacturer disclosed in the security advisory <a href=\"https:\/\/success.trendmicro.com\/solution\/000263633\" target=\"_blank\" rel=\"noopener noreferrer\">SECURITY BULLETIN: Trend Micro OfficeScan XG Hard Link Privilege Escalation Vulnerability<\/a> dated September 3, 2020. Trend Micro has also released a new patch XG SP1 Patch 3 b5684 for Trend Micro OfficeScan XG SP1 for Windows on August 28, 2020. This patch fixes the CVE-2020-24556 vulnerability (escalation of hardlink privileges). However, it is recommended to have a look at the readme file and study the known issues before some installation.&nbsp; <\/p>\n<p>The vulnerabilities are rated as high, whereas the exploitation of hardlink privileges Escalation from Windows 10 version 1909 on was stopped by a patch on the operating system side. Further details can be found in the security advices of the manufacturer. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Administrators using Trend Micro's Apex One, Apex One as a Service (SaaS) and Office Scan XG products as a protection solution on Windows and macOS need to act. The products are vulnerable through four vulnerabilities, but an update is available.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[923,580,1547,2],"tags":[646,69,195,86],"class_list":["post-15554","post","type-post","status-publish","format-standard","hentry","category-macos","category-security","category-software","category-windows","tag-antivirus","tag-security","tag-update","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/15554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=15554"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/15554\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=15554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=15554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=15554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}