Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Trend Micro Patches Vulnerabilities in Hybrid Cloud Security Products

Trend Micro recently patched two high-severity vulnerabilities affecting some of its hybrid cloud security products. Details and proof-of-concept (PoC) exploits have been released by the researchers who found the flaws.

Trend Micro recently patched two high-severity vulnerabilities affecting some of its hybrid cloud security products. Details and proof-of-concept (PoC) exploits have been released by the researchers who found the flaws.

The vulnerabilities are tracked as CVE-2022-23119 and CVE-2022-23120, and they impact Deep Security and Cloud One workload security solutions, specifically the Linux agent component.

The vulnerabilities were discovered by researchers at Swiss-German cybersecurity firm modzero, which released an advisory and PoC exploits on January 19, the same day Trend Micro announced the patches.

It’s worth noting, however, that the flaws were reported to Trend Micro in September and patches were released in October, November and December.

Modzero discovered that the Deep Security Agent for Linux is affected by a directory traversal vulnerability that could allow an attacker to read arbitrary files, and a code injection issue that could be exploited to escalate privileges and execute code as root.

However, the attacker needs to have access to the targeted system and exploitation is only possible if the agent has not been activated or configured.

Modzero’s advisory also mentions that a hardcoded default X.509 certificate and a corresponding private key are shipped with the agent software. The certificate is used for communications with the server before the agent is activated.

“As this certificate ships with a private key it is possible for an attacker to create and sign their own server certificate, imitate a server and to send commands to the client software,” Modzero explained.

Advertisement. Scroll to continue reading.

Last week, Trend Micro informed customers about an information disclosure flaw affecting its Worry-Free Business Security small business product. However, that bug was assigned a “low severity” rating.

Vulnerabilities in Trend Micro products have been known to be exploited by malicious actors, particularly flaws in the cybersecurity firm’s Apex One products.

Related: Trend Micro Patches Critical Vulnerability in Server Protection Solution

Related: Trend Micro Patches Vulnerabilities in Home Network Security Devices

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

DARPA veteran Dan Kaufman has joined Badge as SVP, AI and Cybersecurity.

Kelly Shortridge has been promoted to VP of Security Products at Fastly.

After the passing of Amit Yoran, Tenable has appointed Steve Vintz and Mark Thurmond as co-CEOs.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.