CVE-2025-31283

4.6 MEDIUM

📋 TL;DR

A broken access control vulnerability in Trend Vision One User Roles allowed administrators to create users who could then change their own role assignments, potentially leading to privilege escalation. This affected Trend Vision One deployments where administrators had user creation privileges. The vulnerability has been patched on Trend Vision One's backend service.

💻 Affected Systems

Products:
  • Trend Vision One
Versions: Versions prior to backend service fix (specific version not disclosed)
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments where administrators have user creation permissions. The vulnerability existed in the User Roles component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with administrator access could create a user account, then modify that account's role to gain higher privileges, potentially compromising the entire Trend Vision One environment.

🟠

Likely Case

An administrator could unintentionally or maliciously create elevated privilege accounts, leading to unauthorized access to sensitive security data and controls.

🟢

If Mitigated

With proper role-based access controls and monitoring, the impact would be limited to authorized administrative actions with full audit trails.

🌐 Internet-Facing: LOW - Trend Vision One is typically deployed as a cloud service with authentication requirements.
🏢 Internal Only: MEDIUM - Requires authenticated administrator access, but could be exploited by malicious insiders or compromised admin accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated administrator access. The vulnerability involves manipulating user role assignments through the administrative interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Backend service fix applied (no specific version provided)

Vendor Advisory: https://success.trendmicro.com/en-US/solution/KA-0019386

Restart Required: No

Instructions:

1. Access Trend Vision One portal
2. No action required - vulnerability has been patched on Trend's backend service
3. Verify your instance is updated by checking the advisory link

🔧 Temporary Workarounds

Restrict User Creation Permissions

all

Limit user creation capabilities to only essential administrators

Implement Role Change Monitoring

all

Monitor and alert on user role modification events

🧯 If You Can't Patch

  • Implement strict least-privilege access controls for all administrator accounts
  • Enable comprehensive audit logging for all user creation and role modification events

🔍 How to Verify

Check if Vulnerable:

Check if your Trend Vision One instance has received the backend service update by reviewing the vendor advisory

Check Version:

Contact Trend Micro support for specific version verification

Verify Fix Applied:

Verify with Trend Micro support that your instance is on the patched backend service version

📡 Detection & Monitoring

Log Indicators:

  • Unusual user creation events followed by role modifications
  • Administrator accounts creating users with elevated privileges

Network Indicators:

  • API calls to user creation endpoints followed by role modification endpoints

SIEM Query:

source="trend-vision-one" AND (event_type="user_created" OR event_type="role_modified") | stats count by user, target_user

🔗 References

📤 Share & Export