CVE-2021-45441
📋 TL;DR
This vulnerability in Trend Micro Apex One allows a local attacker with initial low-privileged access to manipulate a specially crafted file and issue commands via a named pipe, leading to privilege escalation. It affects both on-premises and SaaS deployments of Apex One. Attackers must already have some foothold on the target system to exploit this flaw.
💻 Affected Systems
- Trend Micro Apex One
- Trend Micro Apex One as a Service
📦 What is this software?
Apex One by Trendmicro
Apex One by Trendmicro
⚠️ Risk & Real-World Impact
Worst Case
An attacker with initial low-privileged access could achieve SYSTEM/root-level privileges, potentially taking full control of the endpoint, disabling security controls, and moving laterally within the network.
Likely Case
An attacker who has already compromised a user account or application could elevate privileges to administrative levels, bypass security restrictions, and maintain persistence on the system.
If Mitigated
With proper endpoint security controls, network segmentation, and least privilege principles, the impact is limited to the initially compromised account with no lateral movement or persistence.
🎯 Exploit Status
Exploitation requires existing low-privileged code execution on the target system. The vulnerability has been publicly disclosed with technical details, making weaponization likely.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apex One 2019 (aka 14.0.12602) and later
Vendor Advisory: https://success.trendmicro.com/solution/000289996
Restart Required: Yes
Instructions:
1. Download the latest Apex One update from Trend Micro support portal. 2. Apply the update to all affected endpoints. 3. Restart systems as required by the update process. 4. Verify all endpoints are running version 14.0.12602 or later.
🔧 Temporary Workarounds
Restrict named pipe access
windowsConfigure Windows security policies to restrict access to the vulnerable named pipe used by Apex One
Use Windows Group Policy or local security policy to set appropriate permissions on the \\.\pipe\TmCCSF_Comm_* pipes
Implement least privilege
windowsEnsure all user accounts run with minimal necessary privileges to limit impact of initial compromise
🧯 If You Can't Patch
- Implement strict application control policies to prevent execution of unauthorized binaries
- Deploy endpoint detection and response (EDR) solutions to detect privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check Apex One agent version in the Trend Micro console or locally via the agent interface. Versions below 14.0.12602 are vulnerable.
Check Version:
Check the Apex One agent version through the Trend Micro console or examine the agent installation directory properties.
Verify Fix Applied:
Confirm Apex One agent version is 14.0.12602 or higher in the Trend Micro management console or agent properties.
📡 Detection & Monitoring
Log Indicators:
- Unusual named pipe creation/access events in Windows security logs
- Apex One service restart events
- Privilege escalation attempts in security logs
Network Indicators:
- Unusual inter-process communication patterns on affected endpoints
SIEM Query:
EventID=4688 AND (ProcessName LIKE '%TmListen.exe%' OR CommandLine CONTAINS 'TmCCSF_Comm') AND NewProcessName LIKE '%cmd.exe%' OR NewProcessName LIKE '%powershell.exe%'