⚠ Actively exploited
Added to CISA KEV on 2023-09-21. Federal agencies required to patch by 2023-10-12. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable..
CVE-2023-41179
Severity
7.2HIGH
EPSS
2.7%
top 14.21%
CISA KEV
KEV
Added 2023-09-21
Due 2023-10-12
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedSep 19
KEV addedSep 21
KEV dueOct 12
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Description
A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Free Business Security Services could allow an attacker to manipulate the module to execute arbitrary commands on an affected installation.
Note that an attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9
Affected Packages5 packages
▶CVEListV5trend_micro,_inc./trend_micro_worry-free_business_security_servicesSaaS — 6.7.3578 / 14.3.1105
🔴Vulnerability Details
3GHSA▶
GHSA-vq2c-8m6j-g4vh: A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Fr↗2023-09-19
CVEList▶
CVE-2023-41179: A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Fr↗2023-09-19
VulnCheck
▶
📋Vendor Advisories
1CISA▶
Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability↗2023-09-21