CVE-2022-25329

9.8 CRITICAL

📋 TL;DR

CVE-2022-25329 is a critical authentication bypass vulnerability in Trend Micro ServerProtect where the Information Server uses static credentials for authentication. Unauthenticated remote attackers with network access to the Information Server can exploit this to register to the server and perform authenticated actions. This affects Trend Micro ServerProtect deployments with the vulnerable Information Server component exposed.

💻 Affected Systems

Products:
  • Trend Micro ServerProtect
Versions: 6.0 and 5.8
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the Information Server component. The vulnerability exists in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the ServerProtect management server allowing attackers to disable protection, deploy malware, exfiltrate sensitive data, and pivot to other systems in the environment.

🟠

Likely Case

Attackers gain administrative control over ServerProtect, disable endpoint protection, and deploy ransomware or other malware across managed systems.

🟢

If Mitigated

Limited impact due to network segmentation and access controls preventing unauthorized access to the Information Server interface.

🌐 Internet-Facing: HIGH - The vulnerability allows unauthenticated remote exploitation, making internet-facing instances extremely vulnerable to attack.
🏢 Internal Only: HIGH - Even internally, any attacker with network access to the Information Server can exploit this without authentication.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the Information Server (default port 5000/TCP). The vulnerability is straightforward to exploit with publicly available technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to ServerProtect 6.0 SP1 Patch 4 or later

Vendor Advisory: https://success.trendmicro.com/solution/000290507

Restart Required: Yes

Instructions:

1. Download the latest patch from Trend Micro support portal. 2. Apply the patch to all affected ServerProtect servers. 3. Restart the ServerProtect services. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to the ServerProtect Information Server (default port 5000/TCP) to only authorized management systems.

Disable Information Server

windows

If the Information Server functionality is not required, disable it completely.

Stop the 'Trend Micro ServerProtect Information Server' service

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to the Information Server port (5000/TCP) to only trusted management IP addresses.
  • Monitor for unauthorized access attempts to the Information Server interface and implement intrusion detection rules.

🔍 How to Verify

Check if Vulnerable:

Check if ServerProtect Information Server is running on port 5000/TCP and the version is 6.0 or 5.8 without the patch applied.

Check Version:

Check the ServerProtect console or installation directory for version information, or review the installed programs list in Windows.

Verify Fix Applied:

Verify the ServerProtect version is 6.0 SP1 Patch 4 or later, and test that the static credential authentication no longer works.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized connection attempts to port 5000/TCP
  • Unexpected registration events in ServerProtect logs
  • Authentication attempts using static credentials

Network Indicators:

  • Unusual traffic to ServerProtect Information Server port (5000/TCP) from unauthorized sources
  • Multiple failed followed by successful authentication attempts

SIEM Query:

source_port:5000 AND (event_type:authentication OR event_type:connection) AND NOT src_ip IN [authorized_management_ips]

🔗 References

📤 Share & Export