CVE-2021-32460

7.8 HIGH

📋 TL;DR

CVE-2021-32460 is a local privilege escalation vulnerability in Trend Micro Maximum Security 2021 installer that allows attackers with existing local user access to gain elevated system privileges. This affects Trend Micro consumer security software users running vulnerable versions. Attackers must already have local access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Trend Micro Maximum Security
Versions: Version 17.0 (2021 consumer edition)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the consumer edition of Trend Micro Maximum Security 2021; business/enterprise editions are not affected. Requires Windows operating system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could gain SYSTEM/administrator privileges, install malware, disable security controls, access sensitive data, and establish persistence on the compromised system.

🟠

Likely Case

Malicious local users or malware with user-level access could escalate to administrative privileges to bypass security controls, install additional malware, or access protected system resources.

🟢

If Mitigated

With proper access controls and least privilege principles, the impact is limited as attackers would need to first compromise a local account before exploiting this vulnerability.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring existing local access; it cannot be exploited remotely over the internet.
🏢 Internal Only: HIGH - Within an organization, any compromised local account could lead to full system compromise through privilege escalation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires existing local user access. The vulnerability is in the installer's access control mechanisms, making exploitation relatively straightforward for attackers with local access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version (patched in subsequent releases)

Vendor Advisory: https://helpcenter.trendmicro.com/en-us/article/TMKA-10336

Restart Required: Yes

Instructions:

1. Open Trend Micro Maximum Security. 2. Click 'Check for Updates'. 3. Install all available updates. 4. Restart your computer when prompted.

🔧 Temporary Workarounds

Remove vulnerable software

windows

Uninstall Trend Micro Maximum Security 2021 v17.0 and replace with alternative security software

Control Panel > Programs > Uninstall a program > Select Trend Micro Maximum Security > Uninstall

Restrict local user privileges

windows

Implement least privilege access controls to limit what local users can do

🧯 If You Can't Patch

  • Implement strict access controls and limit local user privileges to reduce attack surface
  • Monitor for suspicious privilege escalation attempts and unauthorized installer activity

🔍 How to Verify

Check if Vulnerable:

Check Trend Micro Maximum Security version: Open the application > Help > About. If version is 17.0.x, you are vulnerable.

Check Version:

Get Trend Micro version from application interface or check installed programs in Control Panel

Verify Fix Applied:

After updating, verify version is no longer 17.0.x and check that all updates are installed successfully.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Trend Micro installer activity
  • Privilege escalation attempts
  • Unauthorized process execution with elevated privileges

Network Indicators:

  • Local privilege escalation typically doesn't generate network traffic

SIEM Query:

EventID=4688 AND ProcessName LIKE '%Trend Micro%' AND NewProcessName LIKE '%installer%' AND IntegrityLevel='System'

🔗 References

📤 Share & Export