Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-41179", "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "state": "PUBLISHED", "assignerShortName": "trendmicro", "dateReserved": "2023-08-24T14:57:42.645Z", "datePublished": "2023-09-19T13:44:57.831Z", "dateUpdated": "2024-09-25T14:39:44.648Z"}, "containers": {"cna": {"affected": [{"vendor": "Trend Micro, Inc.", "product": "Trend Micro Apex One", "versions": [{"version": "2019 (14.0)", "status": "affected", "versionType": "semver", "lessThan": "14.0.0.12380"}]}, {"vendor": "Trend Micro, Inc.", "product": "Trend Micro Apex One", "versions": [{"version": "SaaS\t", "status": "affected", "versionType": "semver", "lessThan": "14.0.12637"}]}, {"vendor": "Trend Micro, Inc.", "product": "Trend Micro Worry-Free Business Security", "versions": [{"version": "10.0 SP1", "status": "affected", "versionType": "semver", "lessThan": "10.0 SP1 Build 2495"}]}, {"vendor": "Trend Micro, Inc.", "product": "Trend Micro Worry-Free Business Security Services", "versions": [{"version": "SaaS", "status": "affected", "versionType": "semver", "lessThan": "6.7.3578 / 14.3.1105 "}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Free Business Security Services could allow an attacker to manipulate the module to execute arbitrary commands on an affected installation.\r\n\r\nNote that an attacker must first obtain administrative console access on the target system in order to exploit this vulnerability."}], "providerMetadata": {"orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro", "dateUpdated": "2023-09-21T12:26:39.088Z"}, "references": [{"url": "https://success.trendmicro.com/solution/000294994"}, {"url": "https://success.trendmicro.com/jp/solution/000294706"}, {"url": "https://jvn.jp/en/vu/JVNVU90967486/"}]}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T18:54:05.016Z"}, "title": "CVE Program Container", "references": [{"url": "https://success.trendmicro.com/solution/000294994", "tags": ["x_transferred"]}, {"url": "https://success.trendmicro.com/jp/solution/000294706", "tags": ["x_transferred"]}, {"url": "https://jvn.jp/en/vu/JVNVU90967486/", "tags": ["x_transferred"]}]}, {"problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-94", "lang": "en", "description": "CWE-94 Improper Control of Generation of Code ('Code Injection')"}]}], "affected": [{"vendor": "trendmicro", "product": "apex_one", "cpes": ["cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "2019", "status": "affected"}]}, {"vendor": "trendmicro", "product": "worry-free_business_security", "cpes": ["cpe:2.3:a:trendmicro:worry-free_business_security:10.0:sp1:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "10.0", "status": "affected"}]}, {"vendor": "trendmicro", "product": "worry-free_business_security_services", "cpes": ["cpe:2.3:a:trendmicro:worry-free_business_security_services:-:*:*:*:saas:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "*", "versionType": "custom"}]}, {"vendor": "trendmicro", "product": "apex_one", "cpes": ["cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:saas:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "2019", "status": "affected"}]}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.2, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2024-09-25T14:33:08.513391Z", "id": "CVE-2023-41179", "options": [{"Exploitation": "active"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}, {"other": {"type": "kev", "content": {"dateAdded": "2023-09-21", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-41179"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-25T14:39:44.648Z"}}]}}