Alert - Active exploitation of Trend Micro vulnerabilities

Number: AL20-009
Date: 19 March 2020

AUDIENCE

This Alert is intended for IT professionals and managers of notified organizations. Recipients of this information may redistribute it within their respective organizations.

PURPOSE

An Alert is used to raise awareness of a recently identified cyber threat that may impact cyber information assets, and to provide additional detection and mitigation advice to recipients. The Canadian Centre for Cyber Security ("Cyber Centre") is also available to provide additional assistance regarding the content of this Alert to recipients as requested.

OVERVIEW

The Cyber Centre has become aware of reported exploitation attempts against Trend Micro Apex One and OfficeScan XG products. Trend Micro has recently patched several critical vulnerabilities in these products, including two which have been exploited in the wild. 

ASSESSMENT

On 16 March 2020 Trend Micro disclosed several vulnerabilities in the Trend Micro Apex One and OfficeScan XG products.  These vulnerabilities could allow a remote actor to execute arbitrary code, manipulate agent client components, write and delete files using SYSTEM privileges and bypass root authentication.  Details of the vulnerabilities are as follows:

- CVE-2020-8467: A migration tool component of Trend Micro Apex One and OfficeScan contains a vulnerability which could allow remote attackers to execute arbitrary code on affected installations (RCE). An attempted attack requires user authentication.

- CVE-2020-8468: Trend Micro Apex One and OfficeScan agents are affected by a content validation escape vulnerability which could allow an attacker to manipulate certain agent client components. An attempted attack requires user authentication.

- CVE-2020-8470: Trend Micro Apex One and OfficeScan server contains a vulnerable service DLL file that could allow an attacker to delete any file on the server with SYSTEM level privileges. Authentication is not required to exploit this vulnerability.

- CVE-2020-8598: Trend Micro Apex One and OfficeScan server contains a vulnerable service DLL file that could allow a remote attacker to execute arbitrary code on affected installations with SYSTEM level privileges. Authentication is not required to exploit this vulnerability.

- CVE-2020-8599: Trend Micro Apex One and OfficeScan server contain a vulnerable EXE file that could allow a remote attacker to write arbitrary data to an arbitrary path on affected installations and bypass ROOT login. Authentication is not required to exploit this vulnerability.

While active exploitation has been reported against CVE-2020-8467 and CVE-2020-8468, the remaining three vulnerabilities also warrant urgent action as they do not require authentication to exploit.

SUGGESTED ACTION

- Trend Micro has released updated versions of the Apex One and OfficeScan XG products.  If possible, upgrade to the latest versions.
- Effectively segment networks and implement demilitarized zones (DMZs) with properly configured firewalls to selectively control and monitor traffic passed between zones.
- Minimize network exposure for all systems and ensure that they are not directly accessible from the Internet.
- Ensure the product servers and management consoles are restricted to trusted networks and/or users as appropriate.
- Ensure timely application of patches and updated software.
- Review remote access to critical systems and ensure policies and perimeter security is up to date.

REFERENCES

https://success.trendmicro.com/solution/000245571

 

NOTE TO READERS
The Canadian Centre for Cyber Security (Cyber Centre) operates as part of the Communications Security Establishment.  We are Canada's national authority on cyber security and we lead the government's response to cyber security events. As Canada's national computer security incident response team, the Cyber Centre works in close collaboration with government departments, critical infrastructure, Canadian businesses and international partners to prepare for, respond to, mitigate, and recover from cyber events. We do this by providing authoritative advice and support, and coordinating information sharing and incident response. The Cyber Centre is outward-facing, welcoming partnerships that help build a stronger, more resilient cyber space in Canada.

Date modified: