CVE-2021-44021

7.8 HIGH

📋 TL;DR

This is a local privilege escalation vulnerability in Trend Micro Worry-Free Business Security 10.0 SP1 that allows an attacker with low-privileged access to elevate their privileges on the system. It affects organizations using this specific version of Trend Micro's endpoint security software. The attacker must already have some level of access to the target system to exploit this vulnerability.

💻 Affected Systems

Products:
  • Trend Micro Worry-Free Business Security
Versions: 10.0 SP1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: This vulnerability requires the attacker to already have low-privileged code execution on the target system. It is similar to but distinct from CVE-2021-44019 and CVE-2021-44020.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control of the affected system, potentially compromising the entire endpoint security infrastructure and enabling further lateral movement within the network.

🟠

Likely Case

An attacker with initial access (e.g., through phishing or compromised credentials) escalates to SYSTEM/administrator privileges, allowing them to disable security controls, install malware, or access sensitive data.

🟢

If Mitigated

With proper access controls and least privilege principles, the impact is limited as the attacker would need to first compromise a low-privileged account, and privilege escalation would be detected by security monitoring.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and low-privileged code execution capability first. The vulnerability involves improper privilege management (CWE-269).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the security update referenced in Trend Micro advisory 000289230

Vendor Advisory: https://success.trendmicro.com/solution/000289230

Restart Required: Yes

Instructions:

1. Download the security update from Trend Micro's support portal. 2. Apply the update to all affected systems. 3. Restart systems as required. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict local access

windows

Limit local user access to systems running Trend Micro Worry-Free Business Security to reduce attack surface

Implement least privilege

windows

Ensure all user accounts operate with minimum necessary privileges to limit impact if compromised

🧯 If You Can't Patch

  • Implement strict access controls and monitor for privilege escalation attempts
  • Isolate affected systems from critical network segments and implement additional endpoint protection

🔍 How to Verify

Check if Vulnerable:

Check Trend Micro Worry-Free Business Security version in the product interface or Windows Programs and Features

Check Version:

Check via Trend Micro console or Windows Control Panel > Programs and Features

Verify Fix Applied:

Verify the product version has been updated to a version after the security patch

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events
  • Suspicious process creation with elevated privileges
  • Trend Micro service manipulation attempts

Network Indicators:

  • Unusual outbound connections from Trend Micro processes
  • Lateral movement attempts from affected systems

SIEM Query:

Process creation events where parent process is Trend Micro related and child process runs with elevated privileges

🔗 References

📤 Share & Export