Trend Micro on Tuesday released an advisory to warn customers that a critical vulnerability affecting Apex One and other endpoint security products has been exploited in the wild.
The zero-day flaw, tracked as CVE-2023-41179, impacts Apex One, Apex One SaaS, and Worry-Free Business Security products.
The vulnerability, related to the products’ ability to uninstall third-party security software, can be exploited for arbitrary code execution.
“To exploit this vulnerability, an attacker would need to be able to log into the product’s administrative console. Because an attacker would need to have stolen the product’s management console authentication information in advance, they would not be able to infiltrate the target network using this vulnerability alone,” Trend Micro noted in a Japanese-language advisory.
It added, “Trend Micro has confirmed that this vulnerability has been used in actual attacks. We recommend updating to the latest version as soon as possible.”
Patches have been released for each of the impacted products.
Trend Micro typically does not share information about the attacks exploiting vulnerabilities found in its products.
However, there have been a few instances where some information has come to light, including attribution to Chinese threat actors and the possible exploitation of a flaw in an attack targeting Mitsubishi Electric.
Several Trend Micro product vulnerabilities have been exploited in attacks in the past few years. CISA currently lists nine such flaws in its Known Exploited Vulnerabilities Catalog. The latest zero-day has yet to be added.
Related: Trend Micro Patches Another Apex One Vulnerability Exploited in Attacks
Related: Trend Micro Patches Two Vulnerabilities Exploited in the Wild
Related: AV Under Attack: Trend Micro Confirms Apex One Exploitation