CVE-2019-14688

7.0 HIGH

📋 TL;DR

This CVE describes a DLL hijack vulnerability in Trend Micro product installers that allows attackers to execute arbitrary code during initial product installation. The vulnerability requires an authorized user to run the installer while malicious DLLs are present locally. Only users performing new installations of affected Trend Micro products are impacted.

💻 Affected Systems

Products:
  • Trend Micro OfficeScan
  • Trend Micro Worry-Free Business Security
  • Trend Micro Apex One
Versions: Versions prior to the repackaged installers released in response to this vulnerability
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable during initial product installation, not during normal operation or updates

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges if malicious DLL executes with installer permissions

🟠

Likely Case

Limited impact due to requirement for user interaction during installation and local malicious DLL presence

🟢

If Mitigated

No impact if installations are performed from trusted sources with proper file integrity checks

🌐 Internet-Facing: LOW - Requires local file presence and user interaction during installation
🏢 Internal Only: MEDIUM - Internal users performing installations could be targeted through social engineering

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires social engineering to place malicious DLL and convince user to run installer

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Repackaged installers released by Trend Micro

Vendor Advisory: https://success.trendmicro.com/solution/1123562

Restart Required: No

Instructions:

1. Download updated installers from Trend Micro support portal. 2. Use only repackaged installers for new installations. 3. Existing installations are not affected.

🔧 Temporary Workarounds

Restrict installer execution

windows

Limit who can run installers and from which locations

Verify installer integrity

windows

Check digital signatures and hashes before running installers

Get-AuthenticodeSignature -FilePath 'installer.exe'

🧯 If You Can't Patch

  • Only install from trusted, verified sources with proper file integrity checks
  • Implement application whitelisting to prevent unauthorized installer execution

🔍 How to Verify

Check if Vulnerable:

Check if using original vulnerable installers by comparing file hashes with Trend Micro's advisory

Check Version:

Check installer properties or Trend Micro product documentation for version information

Verify Fix Applied:

Verify using repackaged installers from Trend Micro support portal with updated version numbers

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation during installation
  • DLL loading from unexpected locations

Network Indicators:

  • Downloads of installers from untrusted sources

SIEM Query:

Process creation where parent process is installer and DLL loaded from user-writable location

🔗 References

📤 Share & Export