SB2021012819 - Multiple vulnerabilities in Trend Micro Apex One
Published: January 28, 2021 Updated: February 3, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 17 secuirty vulnerabilities.
1) Improper access control (CVE-ID: CVE-2021-25228)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the web console on port 4343/TCP. A remote attacker can bypass implemented security restrictions and obtain information about the server and agents - such as hotfix information, logs and hostname.
2) Improper access control (CVE-ID: CVE-2021-25234)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the web console on port 4343/TCP. A remote attacker can bypass implemented security restrictions and obtain information about the server and agents - such as hotfix information, logs and hostname.
3) Improper access control (CVE-ID: CVE-2021-25243)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the web console on port 4343/TCP. A remote attacker can bypass implemented security restrictions and obtain information about the server and agents - such as hotfix information, logs and hostname.
4) Improper access control (CVE-ID: CVE-2021-25242)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the web console on port 4343/TCP. A remote attacker can bypass implemented security restrictions and obtain information about the server and agents - such as hotfix information, logs and hostname.
5) Improper access control (CVE-ID: CVE-2021-25240)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the web console on port 4343/TCP. A remote attacker can bypass implemented security restrictions and obtain information about the server and agents - such as hotfix information, logs and hostname.
6) Improper access control (CVE-ID: CVE-2021-25239)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the web console on port 4343/TCP. A remote attacker can bypass implemented security restrictions and obtain information about the server and agents - such as hotfix information, logs and hostname.
7) Improper access control (CVE-ID: CVE-2021-25237)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the web console on port 4343/TCP. A remote attacker can bypass implemented security restrictions and obtain information about the server and agents - such as hotfix information, logs and hostname.
8) Improper access control (CVE-ID: CVE-2021-25235)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the web console on port 4343/TCP. A remote attacker can bypass implemented security restrictions and obtain information about the server and agents - such as hotfix information, logs and hostname.
9) Improper access control (CVE-ID: CVE-2021-25233)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the web console on port 4343/TCP. A remote attacker can bypass implemented security restrictions and obtain information about the server and agents - such as hotfix information, logs and hostname.
10) Improper access control (CVE-ID: CVE-2021-25232)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the web console on port 4343/TCP. A remote attacker can bypass implemented security restrictions and obtain information about the server and agents - such as hotfix information, logs and hostname.
11) Improper access control (CVE-ID: CVE-2021-25231)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the web console on port 4343/TCP. A remote attacker can bypass implemented security restrictions and obtain information about the server and agents - such as hotfix information, logs and hostname.
12) Improper access control (CVE-ID: CVE-2021-25230)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the web console on port 4343/TCP. A remote attacker can bypass implemented security restrictions and obtain information about the server and agents - such as hotfix information, logs and hostname.
13) Improper access control (CVE-ID: CVE-2021-25229)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the web console on port 4343/TCP. A remote attacker can bypass implemented security restrictions and obtain information about the server and agents - such as hotfix information, logs and hostname.
14) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2021-25241)
The disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of user-supplied input within the web console on port 4343/TCP. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.
Successful exploitation of this vulnerability may allow a remote attacker to create a command script to locate online agents and map out network topology a server can communicate with.
15) Improper access control (CVE-ID: CVE-2021-25246)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the web console on port 4343/TCP. A remote attacker can bypass implemented security restrictions and create a bogus agent on an affected server that could be used then make valid configuration queries.
16) Out-of-bounds read (CVE-ID: CVE-2021-25248)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within TmCCSF.exe. A local user can run a specially crafted code on the server to trigger out-of-bounds read error and disclose sensitive information about a named pipe.
17) Out-of-bounds write (CVE-ID: CVE-2021-25249)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when processing untrusted input within TmCCSF.exe. A local user can run a specially crafted program to trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
Remediation
Install update from vendor's website.
References
- https://success.trendmicro.com/solution/000284202
- https://www.zerodayinitiative.com/advisories/ZDI-21-103/
- https://www.zerodayinitiative.com/advisories/ZDI-21-109/
- https://www.zerodayinitiative.com/advisories/ZDI-21-116/
- https://www.zerodayinitiative.com/advisories/ZDI-21-115/
- https://www.zerodayinitiative.com/advisories/ZDI-21-113/
- https://www.zerodayinitiative.com/advisories/ZDI-21-112/
- https://www.zerodayinitiative.com/advisories/ZDI-21-111/
- https://www.zerodayinitiative.com/advisories/ZDI-21-110/
- https://www.zerodayinitiative.com/advisories/ZDI-21-108/
- https://www.zerodayinitiative.com/advisories/ZDI-21-107/
- https://www.zerodayinitiative.com/advisories/ZDI-21-106/
- https://www.zerodayinitiative.com/advisories/ZDI-21-105/
- https://www.zerodayinitiative.com/advisories/ZDI-21-104/
- https://www.zerodayinitiative.com/advisories/ZDI-21-114/
- https://www.zerodayinitiative.com/advisories/ZDI-21-117/
- https://www.zerodayinitiative.com/advisories/ZDI-21-118/
- https://www.zerodayinitiative.com/advisories/ZDI-21-119/