First published: Wed Jan 10 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Apex One NT Listener service. The issue results from an exposed dangerous function. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Apex One |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-029 is rated as a significant privilege escalation vulnerability.
To fix ZDI-24-029, update your Trend Micro Apex One Security Agent to the latest version as recommended in vendor advisories.
ZDI-24-029 affects installations of Trend Micro Apex One Security Agent that have not been updated to mitigate this vulnerability.
No, ZDI-24-029 requires local access to execute low-privileged code before exploitation can occur.
The potential impacts of ZDI-24-029 include unauthorized privilege escalation, allowing attackers to execute commands with elevated permissions.