Trendmicro Apex One vulnerabilities

161 known vulnerabilities affecting trendmicro/apex_one.

Total CVEs
161
CISA KEV
9
actively exploited
Public exploits
0
Exploited in wild
8
Severity breakdown
CRITICAL8HIGH107MEDIUM46

Vulnerabilities

Page 8 of 9
CVE-2020-25773HIGHCVSS 7.8v2019vsaas2020-09-29
CVE-2020-25773 [HIGH] CWE-415 CVE-2020-25773: A vulnerability in the Trend Micro Apex One ServerMigrationTool component could allow an attacker to A vulnerability in the Trend Micro Apex One ServerMigrationTool component could allow an attacker to execute arbitrary code on affected products. User interaction is required to exploit this vulnerability in that the target must import a corrupted configuration file.
nvd
CVE-2020-25774MEDIUMCVSS 4.3v2019vsaas2020-09-29
CVE-2020-25774 [MEDIUM] CWE-125 CVE-2020-25774: A vulnerability in the Trend Micro Apex One ServerMigrationTool component could allow an attacker to A vulnerability in the Trend Micro Apex One ServerMigrationTool component could allow an attacker to trigger an out-of-bounds red information disclosure which would disclose sensitive information to an unprivileged account. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f
nvd
CVE-2020-24564MEDIUMCVSS 5.5v2019vsaas2020-09-29
CVE-2020-24564 [MEDIUM] CWE-125 CVE-2020-24564: An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a loc An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The
nvd
CVE-2020-25770MEDIUMCVSS 5.5v2019vsaas2020-09-29
CVE-2020-25770 [MEDIUM] CVE-2020-25770: An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a loc An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs aff
nvd
CVE-2020-25771MEDIUMCVSS 5.5v2019vsaas2020-09-29
CVE-2020-25771 [MEDIUM] CVE-2020-25771: An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a loc An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs aff
nvd
CVE-2020-25772MEDIUMCVSS 5.5v2019vsaas2020-09-29
CVE-2020-25772 [MEDIUM] CVE-2020-25772: An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a loc An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs aff
nvd
CVE-2020-24565MEDIUMCVSS 5.5v2019vsaas2020-09-29
CVE-2020-24565 [MEDIUM] CVE-2020-24565: An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a loc An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs aff
nvd
CVE-2020-24559HIGHCVSS 7.8v2019vsaas2020-09-01
CVE-2020-24559 [HIGH] CWE-59 CVE-2020-24559: A vulnerability in Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Busine A vulnerability in Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services on macOS may allow an attacker to manipulate a certain binary to load and run a script from a user-writable folder, which then would allow them to execute arbitrary code as root. An attacker must first obtain the ability to execute l
nvd
CVE-2020-24558HIGHCVSS 7.1v2019vsaas2020-09-01
CVE-2020-24558 [HIGH] CWE-125 CVE-2020-24558: A vulnerability in an Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Bus A vulnerability in an Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services dll may allow an attacker to manipulate it to cause an out-of-bounds read that crashes multiple processes in the product. An attacker must first obtain the ability to execute low-privileged code on the target system in order to e
nvd
CVE-2020-24556HIGHCVSS 7.8v2019vsaas2020-09-01
CVE-2020-24556 [HIGH] CWE-59 CVE-2020-24556: A vulnerability in Trend Micro Apex One, OfficeScan XG SP1, Worry-Free Business Security 10 SP1 and A vulnerability in Trend Micro Apex One, OfficeScan XG SP1, Worry-Free Business Security 10 SP1 and Worry-Free Business Security Services on Microsoft Windows may allow an attacker to create a hard link to any file on the system, which then could be manipulated to gain a privilege escalation and code execution. An attacker must first obtain the ability
nvd
CVE-2020-24557HIGHCVSS 7.8KEVv20192020-09-01
CVE-2020-24557 [HIGH] CVE-2020-24557: A vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 on Microsoft Windo A vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 on Microsoft Windows may allow an attacker to manipulate a particular product folder to disable the security temporarily, abuse a specific Windows function and attain privilege escalation. An attacker must first obtain the ability to execute low-privileged code on the target sys
nvd
CVE-2020-8607MEDIUMCVSS 6.7v2019vsaas2020-08-05
CVE-2020-8607 [MEDIUM] CWE-20 CVE-2020-8607: An input validation vulnerability found in multiple Trend Micro products utilizing a particular vers An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker
nvd
CVE-2020-8599CRITICALCVSS 9.8KEVv20192020-03-18
CVE-2020-8599 [CRITICAL] CVE-2020-8599: Trend Micro Apex One (2019) and OfficeScan XG server contain a vulnerable EXE file that could allow Trend Micro Apex One (2019) and OfficeScan XG server contain a vulnerable EXE file that could allow a remote attacker to write arbitrary data to an arbitrary path on affected installations and bypass ROOT login. Authentication is not required to exploit this vulnerability.
nvd
CVE-2020-8598CRITICALCVSS 9.8v20192020-03-18
CVE-2020-8598 [CRITICAL] CWE-306 CVE-2020-8598: Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) server Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) server contains a vulnerable service DLL file that could allow a remote attacker to execute arbitrary code on affected installations with SYSTEM level privileges. Authentication is not required to exploit this vulnerability.
nvd
CVE-2020-8468HIGHCVSS 8.8KEVv20192020-03-18
CVE-2020-8468 [HIGH] CWE-74 CVE-2020-8468: Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) agents Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) agents are affected by a content validation escape vulnerability which could allow an attacker to manipulate certain agent client components. An attempted attack requires user authentication.
nvd
CVE-2020-8467HIGHCVSS 8.8KEVv20192020-03-18
CVE-2020-8467 [HIGH] CVE-2020-8467: A migration tool component of Trend Micro Apex One (2019) and OfficeScan XG contains a vulnerability A migration tool component of Trend Micro Apex One (2019) and OfficeScan XG contains a vulnerability which could allow remote attackers to execute arbitrary code on affected installations (RCE). An attempted attack requires user authentication.
nvd
CVE-2020-8470HIGHCVSS 7.5v20192020-03-18
CVE-2020-8470 [HIGH] CVE-2020-8470: Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) server Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) server contains a vulnerable service DLL file that could allow an attacker to delete any file on the server with SYSTEM level privileges. Authentication is not required to exploit this vulnerability.
nvd
CVE-2019-19691MEDIUMCVSS 4.9v20192019-12-20
CVE-2019-19691 [MEDIUM] CVE-2019-19691: A vulnerability in Trend Micro Apex One and OfficeScan XG could allow an attacker to expose a masked A vulnerability in Trend Micro Apex One and OfficeScan XG could allow an attacker to expose a masked credential key by manipulating page elements using development tools. Note that the attacker must already have admin/root privileges on the product console to exploit this vulnerability.
nvd
CVE-2019-19692MEDIUMCVSS 6.1v20192019-12-20
CVE-2019-19692 [MEDIUM] CWE-79 CVE-2019-19692: Trend Micro Apex One (2019) is affected by a cross-site scripting (XSS) vulnerability on the product Trend Micro Apex One (2019) is affected by a cross-site scripting (XSS) vulnerability on the product console. Note that the Japanese version of the product is NOT affected.
nvd
CVE-2019-18188HIGHCVSS 7.5v20192019-10-28
CVE-2019-18188 [HIGH] CWE-77 CVE-2019-18188: Trend Micro Apex One could be exploited by an attacker utilizing a command injection vulnerability t Trend Micro Apex One could be exploited by an attacker utilizing a command injection vulnerability to extract files from an arbitrary zip file to a specific folder on the Apex One server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to the IUSR account, which has restricted permission and is unable
nvd