
===================================================================                               CERT-Renater

                    Note d'Information No. 2023/VULN052

_____________________________________________________________________

DATE                : 03/02/2023

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Trend Micro Apex One,
                        Trend Micro Apex One as a Service.

====================================================================https://success.trendmicro.com/dcx/s/solution/000292183?language=en_US
_____________________________________________________________________

SECURITY BULLETIN: Trend Micro Apex One File Upload Vulnerability
Product/Version includes:Apex One as a Service 2019, Apex One 2019
Update Date: 2023/02/01
Article Number: 000292183
Category: Upgrade, Update
Rating: 1


Release Date: February 1, 2023
CVE Identifier(s): CVE-2023-0587
Platform(s): Windows
CVSS 3.1 Score(s): 8.2
Severity Rating(s): High

Trend Micro has addressed a File Upload vulnerability in the latest
Apex One Service Pack (on-premise) and January 2023 Apex One as a
Service maintenance.


Affected Version(s)

Product	Affected Version(s) 	Platform 	Language(s)

Apex One    2019 (On-prem)  Server Build 11110	Windows	 English

Apex One as a Service 	Versions before January 2023 maintenance
Windows   English


Solution

Trend Micro has released the following solutions to address the
issue:

Product    Updated version    Notes    Platform     Availability

Apex One    Service Pack SP1 b11564 (repack)     Readme
Windows    Now Available

Apex One as a Service    January 2023 Maintenance
Hotfix - Build 202301 Security Agent version: 14.0.11960
Readme	 Windows    Now Available

These are the minimum recommended version(s)  of the patches
and/or builds required to address the issue. Trend Micro
highly encourages customers to obtain the latest version
of the product if there is a newer one available than
the one listed in this bulletin.

Customers are encouraged to visit Trend Micro’s Download
Center to obtain prerequisite software (such as Service
Packs) before applying any of the solutions above.


Vulnerability Details

CVE-2023-0587:  File Upload Vulnerability
CVSSv3: 8.2: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

A file upload vulnerability in Trend Micro Apex One could
allow a remote attacker to upload arbitrary files to a specific
directory, allowing the attacker to upload a large number of
files to fill up the file system on the affected server.

Mitigating Factors

Exploiting these type of vulnerabilities generally require that
an attacker has access (physical or remote) to a vulnerable
machine. In addition to timely application of patches and updated
solutions, customers are also advised to review remote access to
critical systems and ensure policies and perimeter security is
up-to-date.

However, even though an exploit may require several specific
conditions to be met, Trend Micro strongly encourages customers
to update to the latest builds as soon as possible.


Acknowledgement

Trend Micro would like to thank the following individuals for
esponsibly disclosing these issues and working with Trend Micro
to help protect our customers:

     Tenable Research


External Reference(s)

     Tenable Advisory ID: TRA-2023-5


========================================================+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=======================================================
