CVE-2025-31285

4.6 MEDIUM

📋 TL;DR

A broken access control vulnerability in Trend Vision One allowed administrators to create users who could then modify account roles and escalate privileges. This affected Trend Vision One deployments with administrator access. The vulnerability has been fixed on the backend service.

💻 Affected Systems

Products:
  • Trend Vision One
Versions: Versions prior to backend service fix (specific version not disclosed)
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator access to exploit; vulnerability has been fixed on backend service

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator creates user accounts that can escalate to higher privileges, potentially gaining full system control and bypassing security controls.

🟠

Likely Case

Administrator creates limited user accounts that gain unauthorized administrative access, compromising system integrity and data confidentiality.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized privilege escalation attempts would be detected and prevented before causing damage.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated administrator access; exploitation is straightforward once admin access is obtained

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Backend service fix (no specific version provided)

Vendor Advisory: https://success.trendmicro.com/en-US/solution/KA-0019386

Restart Required: No

Instructions:

1. Ensure Trend Vision One is connected to Trend Micro services. 2. The fix has been applied automatically on the backend service. 3. No customer action required as the vulnerability has been addressed.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit administrator accounts to trusted personnel only and implement least privilege principles

Monitor User Creation and Role Changes

all

Implement logging and alerting for user creation and role modification events

🧯 If You Can't Patch

  • Implement strict access controls and monitor all administrator activities
  • Regularly audit user accounts and role assignments for unauthorized changes

🔍 How to Verify

Check if Vulnerable:

Check if your Trend Vision One instance is connected to Trend Micro services and receiving updates

Check Version:

Check Trend Vision One console for service status and connectivity

Verify Fix Applied:

The vulnerability has been fixed on the backend service; ensure your instance is properly connected

📡 Detection & Monitoring

Log Indicators:

  • Unusual user creation events
  • Role modification events from non-standard accounts
  • Multiple privilege escalation attempts

Network Indicators:

  • Unusual authentication patterns from administrator accounts

SIEM Query:

source="trend-vision-one" AND (event_type="user_creation" OR event_type="role_modification")

🔗 References

📤 Share & Export