Trend Micro Apex Central LFI in Widget Enables RCE
CVE-2023-52325 Published on January 23, 2024
A local file inclusion vulnerability in one of Trend Micro Apex Central's widgets could allow a remote attacker to execute arbitrary code on affected installations. Please note: this vulnerability must be used in conjunction with another one to exploit an affected system. In addition, an attacker must first obtain a valid set of credentials on target system in order to exploit this vulnerability.
Vulnerability Analysis
CVE-2023-52325 can be exploited with network access, and requires small amount of user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
What is a Remote file include Vulnerability?
The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions. In certain versions and configurations of PHP, this can allow an attacker to specify a URL to a remote location from which the software will obtain the code to execute. In other cases in association with path traversal, the attacker can specify a local file that may contain executable statements that can be parsed by PHP.
CVE-2023-52325 has been classified to as a Remote file include vulnerability or weakness.
Products Associated with CVE-2023-52325
Want to know whenever a new CVE is published for TrendMicro Apex Central? stack.watch will email you.
Affected Versions
Trend Micro, Inc. Trend Micro Apex Central:- Version 2019 and below 8.0.0.6570 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.