CVE-2024-36306

6.1 MEDIUM

📋 TL;DR

A link following vulnerability in Trend Micro Apex One and Apex One as a Service Damage Cleanup Engine allows a local attacker with low-privileged code execution to cause denial-of-service conditions on affected installations. This affects organizations using these Trend Micro security products.

💻 Affected Systems

Products:
  • Trend Micro Apex One
  • Trend Micro Apex One as a Service
Versions: Specific versions not detailed in advisory; check vendor documentation
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Damage Cleanup Engine component specifically. Requires local access and ability to execute low-privileged code first.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability of the Apex One service, disrupting security monitoring and potentially allowing other attacks to proceed undetected.

🟠

Likely Case

Temporary service disruption requiring manual restart of Trend Micro components, creating a window of reduced security visibility.

🟢

If Mitigated

Minimal impact with proper access controls preventing low-privileged code execution and monitoring detecting service disruptions.

🌐 Internet-Facing: LOW - Requires local access and low-privileged code execution first.
🏢 Internal Only: MEDIUM - Internal attackers with initial access could disrupt security monitoring services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to execute low-privileged code as prerequisite. Link following vulnerability in file handling.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://success.trendmicro.com/dcx/s/solution/000298063

Restart Required: Yes

Instructions:

1. Review Trend Micro advisory 000298063. 2. Apply the latest security update through Apex One console. 3. Restart affected services/systems as required.

🔧 Temporary Workarounds

Restrict local code execution

windows

Implement application whitelisting and restrict user permissions to prevent low-privileged code execution.

Monitor service health

all

Implement monitoring for Trend Micro service disruptions and automatic alerting.

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local code execution
  • Monitor system logs for service disruptions and implement rapid response procedures

🔍 How to Verify

Check if Vulnerable:

Check Apex One version against vendor advisory and verify if Damage Cleanup Engine is running.

Check Version:

Check Apex One console for version information or review installed programs in Windows.

Verify Fix Applied:

Verify patch installation through Apex One console and confirm service stability.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected service crashes of Trend Micro components
  • Error logs related to Damage Cleanup Engine
  • Access denied errors in file operations

Network Indicators:

  • Unusual outbound connections from Apex One systems during service disruption

SIEM Query:

EventID: 7034 OR EventID: 1000 OR EventID: 1001 with source containing 'Trend Micro' OR 'Apex One'

🔗 References

📤 Share & Export