CVE-2023-25143

9.8 CRITICAL

📋 TL;DR

This vulnerability in Trend Micro Apex One Server installer allows attackers to execute arbitrary code remotely by exploiting an uncontrolled search path element. Attackers can place malicious DLLs in locations the installer searches, leading to remote code execution. All systems running vulnerable versions of Trend Micro Apex One are affected.

💻 Affected Systems

Products:
  • Trend Micro Apex One
Versions: Versions prior to 2019 (Build 11110) and SaaS 2020 (Build 11340)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both on-premise and SaaS deployments. The vulnerability exists in the installer component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, enabling data theft, ransomware deployment, and persistent backdoor installation across the network.

🟠

Likely Case

Remote code execution leading to malware installation, credential harvesting, and lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation and least privilege controls, potentially containing the attack to isolated segments.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates critical severity with low attack complexity. While no public PoC is confirmed, the high score suggests weaponization is likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2019 (Build 11110) and SaaS 2020 (Build 11340)

Vendor Advisory: https://success.trendmicro.com/solution/000292209

Restart Required: Yes

Instructions:

1. Download the latest patch from Trend Micro support portal. 2. Apply the patch to all affected Apex One servers. 3. Restart the server to complete installation. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Restrict DLL search paths

windows

Configure Windows to restrict DLL search paths and prevent loading from untrusted locations

Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager' -Name 'SafeDllSearchMode' -Value 1

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Apex One servers from untrusted networks
  • Apply principle of least privilege to service accounts and restrict file system permissions

🔍 How to Verify

Check if Vulnerable:

Check Apex One server version in the product console or via registry: HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\Apex One\CurrentVersion

Check Version:

reg query "HKLM\SOFTWARE\TrendMicro\Apex One\CurrentVersion" /v ProductVersion

Verify Fix Applied:

Verify version is 2019 (Build 11110) or higher, or SaaS 2020 (Build 11340) or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual DLL loading events in Windows Event Logs (Event ID 7)
  • Suspicious process creation from Apex One installer paths

Network Indicators:

  • Unexpected outbound connections from Apex One servers
  • Anomalous network traffic patterns from management ports

SIEM Query:

source="windows" EventID=7 (ImageLoaded contains "ApexOne" OR ProcessName contains "ApexOne")

🔗 References

📤 Share & Export