Trend Micro Warns Users For Active Exploitation Of A Patched Bug bp-serverscom, unitvpscom

Once again, the practice of procrastinating updates by the users has let the attackers exploit an already-patched vulnerability. Recently, Trend Micro has warned users of active attacks by exploiting a bug in Apex One and OfficeScan. While the vendors already patched the bug, they now urge users to update their systems at the earliest.
In 2020, Trend Micro fixed some serious vulnerabilities in their products Apex One and OfficeScan.
The patches first arrived with their August 2020 update bundle. The fixes addressed four different bugs that include the following.
Despite releasing the patches quite earlier, it seems the vulnerability still existed at the users’ end, thus attracting the hackers to exploit.
In the latest update to the previous advisory, Trend Micro has confirmed that the vulnerability CVE-2020-24557 is under attack. However, the active exploitations only aim at the Apex One bug; OfficeScan remains safe.
Describing this bug in detail, Tenable stated in its advisory ,
A vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 on Microsoft Windows may allow an attacker to manipulate a particular product folder to disable the security temporarily, abuse a specific Windows function and attain privilege escalation. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected.
Given the severity of the flaw, JPCERT has also issued an alert for the users urging them to apply the patches quickly.
Precisely, users of Apex One and OfficeScan should update to the following patched versions.
bp-serverscom unitvpscom

This entry was posted in Статьи. Bookmark the permalink.