Initiatieven voor
Als nationale autoriteit voor cyberveiligheid heeft het CCB verschillende initiatieven ontwikkeld voor specifieke doelgroepen die hier worden gepresenteerd.
Reference:
Advisory #2023-111
Version:
1.0
Affected software:
Apex One SaaS
Apex One version 2019
Virus Buster Business Security (Biz) version 10.0 SP1
Virus Buster Business Security Service (VBBSS)
Type:
Remote Code Execution (RCE)
CVE/CVSS:
CVE-2023-41179CVSS score: 9.1 (critical)CVSSv3: 9.1: AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
https://success.trendmicro.com/jp/solution/000294706 (in Japanese)
Trend Micro published a security advisory for an actively exploited 0-day critical vulnerability affecting multiple products. The vulnerability has a high impact on all vertices of the CIA triad (Confidentiality, Integrity, Availability).
Trend Micro reported that this vulnerability was under active exploitation.
The Centre for Cyber security Belgium recommends system administrators to patch vulnerable systems as soon as possible and to analyze system and network logs for any suspicious activity. If your organization has already identified an intrusion or incident, please report it via: https://cert.be/en/report-incident.
CVE-2023-41179 is an arbitrary code execution vulnerability related to the products’ ability to uninstall third-party security products.
Successful exploitation of this 0-day vulnerability could allow an attacker to execute arbitrary code. To exploit this vulnerability, an attacker would need to be able to log into the product's administrative console.
Because an attacker would need to have stolen the product's management console authentication information in advance, they would not be able to infiltrate the target network using this vulnerability alone.
The Centre for Cyber Security Belgium strongly recommends upgrading your software:
Additionally, Trend Micro recommends restricting access to the management console, and only allowing trusted networks to connect to it.