A vulnerability in the Trend Micro Apex One Security Agent Plug-in User Interface Manager could allow a local attacker to bypass existing security and execute arbitrary code on affected installations.
This CVE address an addtional bypass not covered in CVE-2024-58104.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://success.trendmicro.com/en-US/solution/KA-0018217 |
|
History
Fri, 01 Aug 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trendmicro
Trendmicro apex One |
|
| CPEs | cpe:2.3:a:trendmicro:apex_one:*:*:*:*:on-premises:windows:*:* cpe:2.3:a:trendmicro:apex_one:*:*:*:*:saas:windows:*:* |
|
| Vendors & Products |
Trendmicro
Trendmicro apex One |
Tue, 25 Mar 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-286 | |
| Metrics |
ssvc
|
Tue, 25 Mar 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the Trend Micro Apex One Security Agent Plug-in User Interface Manager could allow a local attacker to bypass existing security and execute arbitrary code on affected installations. This CVE address an addtional bypass not covered in CVE-2024-58104. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: trendmicro
Published: 2025-03-25T17:37:39.464Z
Updated: 2025-03-26T03:55:23.754Z
Reserved: 2025-03-25T17:10:21.396Z
Link: CVE-2024-58105
Updated: 2025-03-25T20:29:19.094Z
Status : Analyzed
Published: 2025-03-25T18:15:34.327
Modified: 2025-08-01T15:23:01.587
Link: CVE-2024-58105
No data.