CVE-2023-0587

9.1 CRITICAL

📋 TL;DR

An unauthenticated remote file upload vulnerability in Trend Micro Apex One allows attackers to upload arbitrary files to the server's SampleSubmission directory. This can lead to denial of service by filling the file system with large files. All systems running the affected build are vulnerable.

💻 Affected Systems

Products:
  • Trend Micro Apex One
Versions: Build 11110
Operating Systems: Windows Server (where Apex One is installed)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Apex One server component specifically. The vulnerability is in the web interface component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service through disk space exhaustion, potentially crashing the Apex One server and disrupting security monitoring.

🟠

Likely Case

Disk space exhaustion leading to service degradation or outage of the Apex One server.

🟢

If Mitigated

Limited impact if network controls block external access and proper monitoring detects unusual file upload activity.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows internet-facing servers to be attacked without credentials.
🏢 Internal Only: HIGH - Even internally, unauthenticated access means any network-accessible system is vulnerable.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a specially crafted HTTP PUT request with a malformed Content-Length header to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 11111 or later

Vendor Advisory: https://success.trendmicro.com/solution/000293415

Restart Required: Yes

Instructions:

1. Log into Trend Micro Apex One console. 2. Navigate to Updates section. 3. Apply the latest security patch. 4. Restart the Apex One server service.

🔧 Temporary Workarounds

Block vulnerable endpoint

all

Use firewall or web application firewall to block access to /officescan/console/html/cgi/fcgiOfcDDA.exe

# Example iptables rule for Linux: iptables -A INPUT -p tcp --dport 80 -m string --string "/officescan/console/html/cgi/fcgiOfcDDA.exe" --algo bm -j DROP
# Example Windows Firewall: New-NetFirewallRule -DisplayName "Block Apex One Vuln" -Direction Inbound -Protocol TCP -LocalPort 80 -RemoteAddress Any -Action Block -Program "%SystemRoot%\system32\svchost.exe" -Service "http"

Restrict network access

all

Limit access to Apex One server to trusted management networks only

# Example: Restrict to specific IP ranges in firewall

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Apex One server from untrusted networks
  • Monitor disk space usage on the Apex One server and set alerts for rapid disk consumption

🔍 How to Verify

Check if Vulnerable:

Check Apex One server build version in console or run: wmic product where "name like 'Trend Micro Apex One%'" get version

Check Version:

wmic product where "name like 'Trend Micro Apex One%'" get version

Verify Fix Applied:

Verify build version is 11111 or higher and test that malformed Content-Length headers to the vulnerable endpoint are rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation in \PCCSRV\TEMP\SampleSubmission directory
  • HTTP PUT requests to /officescan/console/html/cgi/fcgiOfcDDA.exe with abnormal Content-Length headers
  • Rapid disk space consumption alerts

Network Indicators:

  • HTTP PUT requests to the vulnerable endpoint from untrusted sources
  • Unusually large file uploads to the Apex One server

SIEM Query:

source="apex_one_logs" AND (uri="/officescan/console/html/cgi/fcgiOfcDDA.exe" AND method="PUT")

🔗 References

📤 Share & Export