CVE-2025-30640

7.8 HIGH

📋 TL;DR

A link following vulnerability in Trend Micro Deep Security 20.0 agents allows local attackers to escalate privileges on affected systems. Attackers must first gain low-privileged code execution on the target machine to exploit this vulnerability. This affects organizations using Trend Micro Deep Security 20.0 agents.

💻 Affected Systems

Products:
  • Trend Micro Deep Security Agent
Versions: 20.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Deep Security 20.0 agents. Requires local access to the system with ability to execute low-privileged code first.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, enabling complete control over the affected endpoint, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation from a standard user account to SYSTEM/root privileges, allowing installation of persistent malware, disabling security controls, and accessing sensitive system resources.

🟢

If Mitigated

Limited impact with proper endpoint security controls, network segmentation, and least privilege principles in place, potentially containing the escalation to isolated systems.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring existing local access, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Once an attacker gains initial foothold on an internal system (via phishing, malware, etc.), this vulnerability enables significant privilege escalation within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to already have code execution on the target system with low privileges. The vulnerability involves improper handling of symbolic links or junctions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Deep Security Agent 20.0.1-2967 or later

Vendor Advisory: https://success.trendmicro.com/en-US/solution/KA-0019344

Restart Required: Yes

Instructions:

1. Log into Deep Security Manager. 2. Navigate to Computers > Agent Status. 3. Select affected agents. 4. Click Actions > Update Agent. 5. Follow prompts to deploy updated agent version 20.0.1-2967 or later. 6. Restart affected systems after update completes.

🔧 Temporary Workarounds

Restrict local user privileges

all

Implement least privilege principles to limit what low-privileged users can execute on systems

Enable application control

all

Use application whitelisting to prevent unauthorized code execution

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Deep Security agents from critical systems
  • Deploy additional endpoint detection and response (EDR) solutions to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Deep Security Agent version: On Windows: Open Services, find 'Trend Micro Deep Security Agent', check version in properties. On Linux: Run 'dsa_control -a' or check /opt/ds_agent/version.txt

Check Version:

Windows: sc query "Trend Micro Deep Security Agent" | find "VERSION" | Linux: cat /opt/ds_agent/version.txt

Verify Fix Applied:

Verify agent version is 20.0.1-2967 or later using the same commands above

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Deep Security Agent directories
  • Multiple failed privilege escalation attempts in system logs
  • Suspicious symbolic link creation in system directories

Network Indicators:

  • Unusual outbound connections from Deep Security Agent processes
  • Lateral movement attempts from patched systems

SIEM Query:

Process creation where parent_process_name contains 'dsa' AND (process_name contains 'cmd.exe' OR process_name contains 'powershell.exe' OR process_name contains 'bash')

🔗 References

📤 Share & Export