CVE-2021-23139

7.5 HIGH

📋 TL;DR

A null pointer dereference vulnerability in Trend Micro Apex One and Worry-Free Business Security allows attackers to crash the CGI program on affected installations. This could lead to denial of service, disrupting security monitoring and potentially enabling further attacks. Organizations using these specific versions are at risk.

💻 Affected Systems

Products:
  • Trend Micro Apex One
  • Trend Micro Worry-Free Business Security
Versions: 10.0 SP1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both on-premises and SaaS versions. The vulnerability is in the CGI component that handles web interface requests.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service of the security agent, leaving systems unprotected and potentially allowing attackers to bypass security controls to execute further attacks.

🟠

Likely Case

Temporary service disruption of the security agent, requiring restart of affected services and creating a window of vulnerability.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring, though service disruption may still occur.

🌐 Internet-Facing: MEDIUM - CGI programs may be exposed if web interfaces are internet-facing, but typically these agents run internally.
🏢 Internal Only: HIGH - Most deployments are internal, and authenticated attackers could exploit this to disrupt security monitoring.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to the CGI interface and likely some level of authentication. The vulnerability is a straightforward null pointer dereference.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the latest security patch from Trend Micro

Vendor Advisory: https://success.trendmicro.com/solution/000289229

Restart Required: Yes

Instructions:

1. Log into Trend Micro management console. 2. Navigate to Updates section. 3. Download and apply the latest security patch. 4. Restart affected services. 5. Verify patch installation through version check.

🔧 Temporary Workarounds

Restrict CGI Access

windows

Limit network access to the CGI interface using firewall rules to only trusted administrative networks.

Windows Firewall: New-NetFirewallRule -DisplayName 'Block Trend Micro CGI' -Direction Inbound -Protocol TCP -LocalPort [CGI_PORT] -Action Block

Disable Unused Web Interfaces

windows

If web management interface is not required, disable it to remove the attack surface.

Services.msc: Stop 'Trend Micro Apex One Service' or equivalent, set to Disabled if not needed

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Trend Micro management interfaces from general network traffic.
  • Increase monitoring for service crashes and implement automated alerting for security agent failures.

🔍 How to Verify

Check if Vulnerable:

Check installed version in Trend Micro console: Help > About. If version is 10.0 SP1 without latest patches, system is vulnerable.

Check Version:

In Trend Micro console: Navigate to Help > About to view current version

Verify Fix Applied:

Verify patch installation through management console update history and confirm version is no longer 10.0 SP1 base version.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected service crashes of Trend Micro processes
  • CGI process termination events in Windows Event Logs
  • Failed authentication attempts to CGI interface

Network Indicators:

  • Unusual traffic patterns to CGI ports (typically 4343, 4118)
  • Multiple connection attempts to Trend Micro web interface

SIEM Query:

source='windows' AND (process_name='*trend*' AND event_id=1000) OR (destination_port IN (4343, 4118) AND protocol='TCP' AND bytes_sent>1000)

🔗 References

📤 Share & Export