CVE-2022-24678

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to flood temporary log locations in Trend Micro security agents, consuming all disk space and causing denial-of-service. Affected products include Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1, and Worry-Free Business Security Services agents.

💻 Affected Systems

Products:
  • Trend Micro Apex One
  • Trend Micro Apex One as a Service
  • Trend Micro Worry-Free Business Security 10.0 SP1
  • Trend Micro Worry-Free Business Security Services
Versions: All versions prior to patches released in February 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the security agent components across both on-premise and cloud-managed deployments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability due to disk exhaustion, preventing legitimate operations and potentially requiring physical intervention to restore functionality.

🟠

Likely Case

Degraded system performance leading to service disruption, failed security scans, and inability to process new security events.

🟢

If Mitigated

Minimal impact with proper monitoring and disk space management, though temporary performance degradation may occur during attack attempts.

🌐 Internet-Facing: MEDIUM - Attackers could target exposed management interfaces or agents with internet connectivity.
🏢 Internal Only: HIGH - Internal attackers or compromised systems could easily exploit this to disrupt security monitoring across the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to write to the temporary log location, which typically requires some level of access to the target system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apex One: Hotfix 23598 or later; Worry-Free Business Security: Build 10.0.2041 or later

Vendor Advisory: https://success.trendmicro.com/solution/000290464

Restart Required: Yes

Instructions:

1. Download the appropriate hotfix from Trend Micro support portal. 2. Apply the patch to affected systems. 3. Restart the Trend Micro services or reboot the system as required.

🔧 Temporary Workarounds

Monitor and manage disk space

windows

Implement monitoring for disk usage on systems running Trend Micro agents and set up alerts for high disk utilization.

Restrict write access to log directories

windows

Apply strict permissions to temporary log directories to prevent unauthorized write operations.

icacls "C:\Program Files\Trend Micro\Apex One\PCCSRV\Logs" /deny Everyone:(OI)(CI)W

🧯 If You Can't Patch

  • Implement disk space monitoring with automated alerts for high utilization
  • Restrict network access to Trend Micro agent management interfaces

🔍 How to Verify

Check if Vulnerable:

Check Trend Micro agent version in the console or via 'About' in the agent interface. Compare against patched versions.

Check Version:

Check agent version in Trend Micro console or via Windows Services (services.msc) for Trend Micro services

Verify Fix Applied:

Verify agent version shows patched version and monitor disk space consumption during normal operations.

📡 Detection & Monitoring

Log Indicators:

  • Rapid growth of log files in Trend Micro directories
  • Disk space alerts from monitoring systems
  • Failed Trend Micro service events

Network Indicators:

  • Unusual volume of traffic to Trend Micro agent ports
  • Multiple failed authentication attempts to management interfaces

SIEM Query:

source="windows" AND (EventID=2013 OR "disk space" OR "Trend Micro" AND ("failed" OR "error"))

🔗 References

📤 Share & Export