CVE-2022-23119

7.5 HIGH

📋 TL;DR

A directory traversal vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux allows authenticated attackers to read arbitrary files from the file system. This affects Linux agents version 20 and below. Exploitation requires compromised access to the Deep Security Manager or an unactivated/unconfigured agent.

💻 Affected Systems

Products:
  • Trend Micro Deep Security Agent
  • Trend Micro Cloud One - Workload Security Agent
Versions: Version 20 and below
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Linux agents. Requires compromised DSM access or unactivated/unconfigured agent state for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with compromised DSM credentials could read sensitive system files, configuration files, or credentials stored on the filesystem, potentially leading to full system compromise.

🟠

Likely Case

An attacker with initial access could escalate privileges by reading sensitive configuration files or credentials, enabling lateral movement within the environment.

🟢

If Mitigated

With proper access controls and activated/configured agents, the attack surface is significantly reduced, limiting impact to already compromised systems.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication to DSM or access to unactivated agent. Directory traversal techniques are well-documented and simple to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 20.0.1-2909 or later

Vendor Advisory: https://success.trendmicro.com/solution/000290104

Restart Required: Yes

Instructions:

1. Update Deep Security Manager to latest version. 2. Deploy updated agent packages to all affected Linux systems. 3. Restart agents after deployment.

🔧 Temporary Workarounds

Restrict DSM Access

all

Limit access to Deep Security Manager to only authorized administrators and systems.

Ensure Agent Activation

linux

Verify all agents are properly activated and configured to remove unactivated attack vector.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Deep Security Manager and agents from untrusted networks.
  • Monitor for unusual file access patterns from DSM or agent processes using file integrity monitoring.

🔍 How to Verify

Check if Vulnerable:

Check agent version: /opt/ds_agent/dsa_query -v | grep 'Agent version'

Check Version:

/opt/ds_agent/dsa_query -v

Verify Fix Applied:

Verify agent version is 20.0.1-2909 or higher: /opt/ds_agent/dsa_query -v

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in agent logs
  • Multiple failed file access attempts from DSM

Network Indicators:

  • Unusual outbound connections from agents following file access

SIEM Query:

source="trendmicro_agent" AND (event="file_access" OR event="directory_traversal")

🔗 References

📤 Share & Export