CVE-2023-34144

7.8 HIGH

📋 TL;DR

This is an untrusted search path vulnerability in Trend Micro Apex One and Apex One as a Service security agents that allows local attackers to escalate privileges on affected systems. Attackers must first have low-privileged code execution capability to exploit this vulnerability. Organizations using affected versions of these Trend Micro products are at risk.

💻 Affected Systems

Products:
  • Trend Micro Apex One
  • Trend Micro Apex One as a Service
Versions: Specific affected versions not specified in provided references; check vendor advisory for exact versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: This vulnerability affects the security agent software itself, not the underlying operating system configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, allowing attackers to install malware, steal sensitive data, disable security controls, and maintain persistent access.

🟠

Likely Case

Local privilege escalation enabling attackers to bypass security restrictions, access protected resources, and potentially move laterally within the network.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, though the vulnerability still provides a foothold for determined attackers.

🌐 Internet-Facing: LOW - This requires local access and cannot be exploited remotely over the internet.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts with local access can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to execute low-privileged code first. Similar to CVE-2023-34145 but not identical.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US

Restart Required: Yes

Instructions:

1. Review Trend Micro advisory 000293322. 2. Download and apply the latest security update from Trend Micro. 3. Restart affected systems to complete installation. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict local user privileges

windows

Limit local user accounts to only necessary privileges to reduce attack surface

Implement application whitelisting

windows

Use Windows AppLocker or similar to restrict execution of unauthorized binaries

🧯 If You Can't Patch

  • Implement strict access controls to limit who has local login capabilities
  • Deploy enhanced monitoring and alerting for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Trend Micro Apex One agent version against vulnerable versions listed in advisory 000293322

Check Version:

Check Trend Micro Apex One console or agent properties for version information

Verify Fix Applied:

Verify agent version has been updated to patched version specified in Trend Micro advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation with elevated privileges
  • Security agent service restarts or failures
  • DLL loading from unexpected locations

Network Indicators:

  • Unusual outbound connections from security agent processes

SIEM Query:

Process creation events where parent process is Trend Micro agent and child process has elevated privileges

🔗 References

📤 Share & Export