
CVE-2023-32555 – Trend Micro Apex One Security Agent Time-Of-Check Time-Of-Use Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2023-32555
17 May 2023 — A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: a local attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32554. This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Securit... • https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2023-32556 – Trend Micro Apex One Security Agent Link Following Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2023-32556
17 May 2023 — A link following vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to disclose sensitive information. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged ... • https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2023-32523 – Trend Micro Mobile Security for Enterprises widget WFUser Authentication Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2023-32523
12 May 2023 — Affected versions of Trend Micro Mobile Security (Enterprise) 9.8 SP5 contain some widgets that would allow a remote user to bypass authentication and potentially chain with other vulnerabilities. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This is similar to, but not identical to CVE-2023-32524. This vulnerability allows remote attackers to bypass authentication on affected installations of Trend Micro... • https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US • CWE-287: Improper Authentication •

CVE-2023-32524 – Trend Micro Mobile Security for Enterprises widgetforsecurity WFUser Authentication Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2023-32524
12 May 2023 — Affected versions of Trend Micro Mobile Security (Enterprise) 9.8 SP5 contain some widgets that would allow a remote user to bypass authentication and potentially chain with other vulnerabilities. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This is similar to, but not identical to CVE-2023-32523. This vulnerability allows remote attackers to bypass authentication on affected installations of Trend Micro... • https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US • CWE-287: Improper Authentication •

CVE-2023-32525 – Trend Micro Mobile Security for Enterprises widget set_certificates_config Unrestricted File Upload Vulnerability
https://notcve.org/view.php?id=CVE-2023-32525
12 May 2023 — Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widget vulnerabilities that could allow a remote attacker to create arbitrary files on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32526. This vulnerability allows remote attackers to create arbitrary files on affected installations of Trend Micro Mobile Security for Enterpris... • https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2023-32526 – Trend Micro Mobile Security for Enterprises widgetforsecurity set_certificates_config Unrestricted File Upload Vulnerability
https://notcve.org/view.php?id=CVE-2023-32526
12 May 2023 — Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widget vulnerabilities that could allow a remote attacker to create arbitrary files on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32525. This vulnerability allows remote attackers to create arbitrary files on affected installations of Trend Micro Mobile Security for Enterpris... • https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2023-32527 – Trend Micro Mobile Security for Enterprises widget getWidgetPoolManager Local File Inclusion Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-32527
12 May 2023 — Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains vulnerable .php files that could allow a remote attacker to execute arbitrary code on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32528. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Mobile Security for Enterprise... • https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2023-32528 – Trend Micro Mobile Security for Enterprises widgetforsecurity getWidgetPoolManager Local File Inclusion Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-32528
12 May 2023 — Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains vulnerable .php files that could allow a remote attacker to execute arbitrary code on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32527. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Mobile Security for Enterprise... • https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2023-25069 – Trend Micro TXOne StellarOne Improper Access Control Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2023-25069
17 Mar 2023 — TXOne StellarOne has an improper access control privilege escalation vulnerability in every version before V2.0.1160 that could allow a malicious, falsely authenticated user to escalate his privileges to administrator level. With these privileges, an attacker could perform actions they are not authorized to. Please note: an attacker must first obtain a low-privileged authenticated user's profile on the target system in order to exploit this vulnerability. This vulnerability allows remote attackers to escala... • https://success.trendmicro.com/solution/000292486 •

CVE-2023-28005
https://notcve.org/view.php?id=CVE-2023-28005
14 Mar 2023 — A vulnerability in Trend Micro Endpoint Encryption Full Disk Encryption version 6.0.0.3204 and below could allow an attacker with physical access to an affected device to bypass Microsoft Windows� Secure Boot process in an attempt to execute other attacks to obtain access to the contents of the device. An attacker must first obtain physical access to the target system in order to exploit this vulnerability. It is also important to note that the contents of the drive(s) encrypted with TMEE FDE would still be... • https://success.trendmicro.com/solution/000292473 •