• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
trend micro releases urgent fix for actively exploited critical security

Trend Micro Releases Urgent Fix for Actively Exploited Critical Security Vulnerability

You are here: Home / General Cyber Security News / Trend Micro Releases Urgent Fix for Actively Exploited Critical Security Vulnerability
September 20, 2023

Cybersecurity organization Trend Micro has unveiled patches and hotfixes to address a critical security flaw in Apex Just one and Stress-Cost-free Enterprise Security options for Windows that has been actively exploited in serious-earth attacks.

Tracked as CVE-2023-41179 (CVSS rating: 9.1), it relates to a 3rd-party antivirus uninstaller module that is bundled together with the application. The entire record of impacted goods is as follows –

  • Apex Just one – edition 2019 (on-premise), fixed in SP1 Patch 1 (B12380)
  • Apex One as a Provider – preset in SP1 Patch 1 (B12380) and Agent edition 14..12637
  • Fear-Free Business enterprise Security – model 10. SP1, fastened in 10. SP1 Patch 2495
  • Stress-Free of charge Company Security Products and services – fastened in July 31, 2023, Month-to-month Servicing Launch

Craze Micro explained that a effective exploitation of the flaw could make it possible for an attacker to manipulate the part to execute arbitrary instructions on an influenced installation. However, it needs that the adversary now has administrative console accessibility on the concentrate on program.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

The organization also warned that it has “noticed at the very least a single active try of likely exploitation of this vulnerability in the wild,” building it critical that customers shift rapidly to implement the patches.

As a workaround, it truly is recommending that buyers restrict access to the product’s administration console to trustworthy networks.

CISA Adds Nine Flaws to KEV Catalog

The advancement will come as the U.S. Cybersecurity and Infrastructure Security Company (CISA) included 9 flaws to its Recognized Exploited Vulnerabilities (KEV) catalog, citing proof of energetic exploitation in the wild –

  • CVE-2014-8361 (CVSS rating: N/A) – Realtek SDK Inappropriate Input Validation Vulnerability
  • CVE-2017-6884 (CVSS score: 8.8) – Zyxel EMG2926 Routers Command Injection Vulnerability
  • CVE-2021-3129 (CVSS score: 9.8) – Laravel Ignition File Add Vulnerability
  • CVE-2022-22265 (CVSS rating: 7.8) – Samsung Cell Units Use-Just after-Totally free Vulnerability
  • CVE-2022-31459 (CVSS rating: 6.5) – Owl Labs Meeting Owl Inadequate Encryption Energy Vulnerability
  • CVE-2022-31461 (CVSS rating: 6.5) – Owl Labs Conference Owl Missing Authentication for Critical Functionality Vulnerability
  • CVE-2022-31462 (CVSS score: 8.8) – Owl Labs Meeting Owl Use of Tricky-coded Qualifications Vulnerability
  • CVE-2022-31463 (CVSS rating: 7.1) – Owl Labs Assembly Owl Inappropriate Authentication Vulnerability
  • CVE-2023-28434 (CVSS rating: 8.8) – MinIO Security Attribute Bypass Vulnerability

It really is really worth noting that a fifth flaw impacting Owl Labs Assembly Owl (CVE-2022-31460, CVSS score: 7.4), a case of difficult-coded credentials, was earlier additional to the KEV catalog on June 8, 2022, just times following Modzero disclosed specifics of the flaws.

Approaching WEBINARLevel-Up SaaS Security: A Complete Manual to ITDR and SSPM

Keep forward with actionable insights on how ITDR identifies and mitigates threats. Study about the indispensable part of SSPM in ensuring your identification remains unbreachable.

Supercharge Your Capabilities

“By exploiting the vulnerabilities[…], an attacker can uncover registered equipment, their data, and homeowners from all over the world,” the Swiss security consultancy business said at the time.

“Attackers can also accessibility private screenshots of whiteboards or use the Owl to get access to the owner’s network. The PIN defense, which guards the Owl from unauthorized use, can be circumvented by an attacker by (at the very least) four diverse approaches.”

Even more troublingly, the products can be turned into rogue wi-fi network gateways to a area company network remotely via Bluetooth by arbitrary consumers and can be abused to act as a backdoor to owners’ neighborhood networks. It is currently not recognised how these vulnerabilities are exploited in the wild.

The security weak point impacting MinIO has occur less than abuse in the latest months, with Security Joes revealing this month that an unnamed danger actor is exploiting it in conjunction with CVE-2023-28432 (CVSS score: 7.5) to attain unauthorized code execution on susceptible servers and drop abide by-on payloads.

Discovered this article interesting? Observe us on Twitter  and LinkedIn to study a lot more distinctive content we article.


Some areas of this write-up are sourced from:
thehackernews.com

Previous Post: «shroudedsnooper's httpsnoop backdoor targets middle east telecom companies ShroudedSnooper’s HTTPSnoop Backdoor Targets Middle East Telecom Companies
Next Post: GitLab Releases Urgent Security Patches for Critical Vulnerability gitlab releases urgent security patches for critical vulnerability»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.