CVE-2023-32521

9.1 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to delete arbitrary files on systems running Trend Micro Mobile Security (Enterprise) 9.8 SP5 through a path traversal flaw in a specific service DLL. This affects organizations using the vulnerable version of Trend Micro's mobile security product for enterprise devices.

💻 Affected Systems

Products:
  • Trend Micro Mobile Security (Enterprise)
Versions: 9.8 SP5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the enterprise version of Trend Micro Mobile Security, not consumer versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, leading to service disruption, data loss, or enabling further attacks by removing security controls.

🟠

Likely Case

Service disruption or data loss through targeted deletion of application files, configuration files, or user data.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthenticated access to the vulnerable service.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires network access to the vulnerable service but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the patch referenced in Trend Micro advisory 000293106

Vendor Advisory: https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US

Restart Required: Yes

Instructions:

1. Download the patch from Trend Micro support portal. 2. Apply the patch to all affected systems. 3. Restart the Trend Micro Mobile Security service or reboot the system.

🔧 Temporary Workarounds

Network Access Restriction

windows

Restrict network access to the Trend Micro Mobile Security service to only trusted internal networks.

Use Windows Firewall: netsh advfirewall firewall add rule name="Block Trend Micro Ports" dir=in action=block program="C:\Program Files\Trend Micro\Mobile Security\service.exe" enable=yes

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate systems running the vulnerable software
  • Deploy additional monitoring and file integrity checking on critical system directories

🔍 How to Verify

Check if Vulnerable:

Check if Trend Micro Mobile Security (Enterprise) version 9.8 SP5 is installed via Control Panel > Programs and Features or using PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Trend Micro Mobile Security*'}

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Trend Micro Mobile Security*'} | Select-Object Name, Version

Verify Fix Applied:

Verify the patch has been applied by checking the version in the Trend Mobile Security console or confirming the patch installation date in Windows Update history.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in Trend Micro logs
  • Failed file access attempts with path traversal patterns (../ sequences)
  • Service restart events following file operations

Network Indicators:

  • Unusual network traffic to Trend Micro Mobile Security service ports from untrusted sources
  • Multiple file deletion requests in short timeframes

SIEM Query:

source="trend_micro_logs" AND (event_type="file_deletion" OR message="*../*")

🔗 References

📤 Share & Export