First published: Tue Jan 23 2024(Updated: )
A local file inclusion vulnerability in one of Trend Micro Apex Central's widgets could allow a remote attacker to execute arbitrary code on affected installations. Please note: this vulnerability must be used in conjunction with another one to exploit an affected system. In addition, an attacker must first obtain a valid set of credentials on target system in order to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Apex Central | ||
Trend Micro Apex Central | =2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52325 has a high-severity rating due to its potential for remote code execution.
To fix CVE-2023-52325, it is recommended to apply the latest patches provided by Trend Micro for Apex Central.
CVE-2023-52325 affects Trend Micro Apex Central version 2019 on Windows.
Yes, CVE-2023-52325 can be exploited by a remote attacker but requires another vulnerability to be exploited in conjunction.
The potential impacts of CVE-2023-52325 include arbitrary code execution and system takeover on affected installations.