» » Trend Micro Patches Another Apex One Vulnerability Exploited in Attacks

Trend Micro Patches Another Apex One Vulnerability Exploited in Attacks

Trend Micro Patches Another Apex One Vulnerability Exploited in Attacks

Residence › Vulnerabilities

Pattern Micro Patches One other Apex One Vulnerability Exploited in Assaults

By Eduard Kovacs on September 13, 2022

Tweet

Pattern Micro introduced on Tuesday that it has patched a number of flaws in its Apex One endpoint safety product, together with a zero-day vulnerability.

The exploited vulnerability is tracked as CVE-2022-40139 and it has been described as an improper validation difficulty associated to a rollback perform. The safety gap permits the agent to obtain unverified rollback elements and execute arbitrary code, in accordance with a translation of a Japanese-language advisory launched by Pattern Micro.

This high-severity vulnerability can solely be exploited by an attacker who is ready to log into the product’s admin console.

“Because the attacker will need to have beforehand stolen the authentication info for the product’s administration console, it’s not attainable to infiltrate the goal community utilizing this vulnerability alone,” the cybersecurity agency defined.

No info is obtainable on the assaults exploiting CVE-2022-40139, however SecurityWeek has reached out to Pattern Micro and can replace this text if extra particulars are offered.

It’s not unusual for risk actors to use vulnerabilities in Pattern Micro merchandise, with a number of assaults being reported prior to now few years. The safety holes seem to have principally been exploited in focused assaults, and in some circumstances Chinese language risk actors have been confirmed as the primary suspect.

Along with the zero-day vulnerability, the Apex One patches additionally deal with three different high-severity and two medium-severity points.

Essentially the most severe of them is CVE-2022-40144, which may enable an attacker to bypass authentication utilizing specifically crafted requests. In concept, it could be attainable to chain such vulnerabilities with the aforementioned zero-day to realize the authentication requirement, however Pattern Micro has not talked about something about CVE-2022-40144 being exploited in assaults.

The opposite vulnerabilities patched by Pattern Micro could be exploited for privilege escalation, DoS assaults, and acquiring details about a focused server.

In keeping with CISA’s Identified Exploited Vulnerabilities Catalog, eight different Pattern Micro flaws have been exploited within the wild prior to now years, most of which impression Apex merchandise.

Associated: Pattern Micro Confirms In-the-Wild Zero-Day Assaults

Associated: Pattern Micro OfficeScan Flaw Apparently Exploited in Mitsubishi Electrical Hack

Associated: Pattern Micro Patches Vulnerabilities in Hybrid Cloud Safety Merchandise

Get the Day by day Briefing

 
 
 

  • Most Latest
  • Most Learn
  • Pattern Micro Patches One other Apex One Vulnerability Exploited in Assaults
  • Immediately: 2022 CISO Discussion board Digital Occasion
  • iOS 16 Rolls Out With Passwordless Authentication, Spyware and adware Safety
  • FBI Warns of Unpatched and Outdated Medical System Dangers
  • Spyware and adware, Ransomware, Cryptojacking Malware More and more Detected on ICS Gadgets
  • U-Haul Says Buyer Information Accessed Utilizing Compromised Credentials
  • Peiter ‘Mudge’ Zatko: The Wild Card in Musk’s Conflict With Twitter
  • Apple Warns of macOS Kernel Zero-Day Exploitation
  • Google Completes $5.four Billion Acquisition of Mandiant
  • New Cyberespionage Group ‘Worok’ Concentrating on Entities in Asia

Searching for Malware in All of the Fallacious Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Pc Says About You

Be in a Place to Act By Cyber Situational Consciousness

Report Exhibits Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice Yr To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

How one can Establish Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Enticing

How one can Defend In opposition to DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles