Security News > 2023 > September > Critical Trend Micro vulnerability exploited in the wild (CVE-2023-41179)
Trend Micro has fixed a critical zero-day vulnerability in several of its endpoint security products for enterprises that has been spotted being exploited in the wild.
"Trend Micro has observed at least one active attempt of potential exploitation of in the wild," the company shared.
Still, patching/updating is the best and preferred course of action because the vulnerability may also be exploited for lateral movement by attackers who have gained access to other company assets via other means.
"Even though an exploit may require several specific conditions to be met, Trend Micro strongly encourages customers to update to the latest builds as soon as possible," the company stressed.
The vulnerability has been fixed in Trend Micro Apex One as a Service and Worry-Free Business Security Services with patches released in July 2023.
Admins of Trend Micro Apex One On Premise and Worry-Free Business Security should implement the latest patches - SP1 Patch 1 and 10.0 SP1 Patch 2495, respectively - as soon as possible.
News URL
https://www.helpnetsecurity.com/2023/09/21/cve-2023-41179/
Related news
- GitLab warns of critical pipeline execution vulnerability (source)
- SolarWinds Issues Patch for Critical ARM Vulnerability Enabling RCE Attacks (source)
- Critical Ivanti Cloud Appliance Vulnerability Exploited in Active Cyberattacks (source)
- CISA Flags Critical Ivanti vTM Vulnerability Amid Active Exploitation Concerns (source)
- PoC for critical SolarWinds Web Help Desk vulnerability released (CVE-2024-28987) (source)
- Critical NVIDIA Container Toolkit Vulnerability Could Grant Full Host Access to Attackers (source)
- Critical Zimbra RCE vulnerability under mass exploitation (CVE-2024-45519) (source)
- Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability (source)
- Week in review: Critical Zimbra RCE vulnerability exploited, Patch Tuesday forecast (source)
- Experts Warn of Critical Unpatched Vulnerability in Linear eMerge E3 Systems (source)