⚠ Actively exploited
Added to CISA KEV on 2023-09-21. Federal agencies required to patch by 2023-10-12. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable..

CVE-2023-41179

CWE-94Code Injection6 documents6 sources
Severity
7.2HIGH
EPSS
2.7%
top 14.21%
CISA KEV
KEV
Added 2023-09-21
Due 2023-10-12
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedSep 19
KEV addedSep 21
KEV dueOct 12
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Description

A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Free Business Security Services could allow an attacker to manipulate the module to execute arbitrary commands on an affected installation. Note that an attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages5 packages

🔴Vulnerability Details

3
GHSA
GHSA-vq2c-8m6j-g4vh: A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Fr2023-09-19
CVEList
CVE-2023-41179: A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Fr2023-09-19
VulnCheck
Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability2023

📋Vendor Advisories

1
CISA
Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability2023-09-21

🕵️Threat Intelligence

1
Bleepingcomputer
Trend Micro fixes endpoint protection zero-day used in attacks2023-09-19
CVE-2023-41179 (HIGH CVSS 7.2) | A vulnerability in the 3rd party AV | cvebase.io