CVE-2024-48903

7.8 HIGH

📋 TL;DR

An improper access control vulnerability in Trend Micro Deep Security Agent 20 allows local attackers to escalate privileges on affected systems. Attackers must first gain low-privileged code execution on the target machine to exploit this vulnerability. Organizations using Trend Micro Deep Security Agent 20 are affected.

💻 Affected Systems

Products:
  • Trend Micro Deep Security Agent
Versions: Version 20.0 (build 1526 and earlier)
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access and ability to execute low-privileged code first. All installations of affected versions are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative/root privileges, enabling complete control over the affected endpoint, data theft, lateral movement, and persistence establishment.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install malware, access sensitive data, and maintain persistence on compromised systems.

🟢

If Mitigated

Limited impact due to proper access controls, network segmentation, and endpoint protection preventing initial low-privileged access required for exploitation.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and low-privileged execution first. The vulnerability is in access control mechanisms, making exploitation straightforward once initial access is achieved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 20.0.0-1527 or later

Vendor Advisory: https://success.trendmicro.com/en-US/solution/KA-0017997

Restart Required: Yes

Instructions:

1. Download the latest Deep Security Agent update from Trend Micro support portal. 2. Deploy the update to all affected endpoints. 3. Restart the Deep Security Agent service or reboot systems as required.

🔧 Temporary Workarounds

Restrict local user privileges

all

Limit local user accounts to minimal necessary privileges to reduce attack surface for initial low-privileged access.

Implement application whitelisting

all

Use application control policies to prevent unauthorized code execution that could lead to initial low-privileged access.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from critical assets
  • Deploy additional endpoint detection and response (EDR) solutions to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Deep Security Agent version: On Windows: Check Add/Remove Programs or Services for version number. On Linux: Check package manager or run 'dsa_control -v'.

Check Version:

Windows: Check registry at HKLM\SOFTWARE\TrendMicro\Deep Security Agent\Version or Services.msc. Linux: rpm -qa | grep ds-agent or dpkg -l | grep ds-agent

Verify Fix Applied:

Verify agent version is 20.0.0-1527 or later and check that the Deep Security Agent service is running without errors.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation with elevated privileges from low-privileged users
  • Deep Security Agent service restart failures or errors
  • Security policy violations related to privilege escalation

Network Indicators:

  • Unusual outbound connections from Deep Security Agent processes
  • Lateral movement attempts from affected systems

SIEM Query:

Process creation where parent process is low privilege user and child process runs with SYSTEM/root privileges on systems with Deep Security Agent

🔗 References

📤 Share & Export