CVE-2024-58104
Published: 25 March 2025
Summary
CVE-2024-58104 is a high-severity Improper Privilege Management (CWE-269) vulnerability in Trendmicro Apex One. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 1.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation directly patches the vulnerability in the Trend Micro Apex One Security Agent Plug-in User Interface Manager, preventing local privilege escalation and arbitrary code execution.
Least privilege enforcement counters CWE-269 improper privilege management, restricting low-privileged attackers from escalating via the UI Manager despite initial code execution capability.
Reference monitor implementation mediates all access control decisions, mitigating bypasses of existing security in the UI Manager by ensuring complete and tamper-proof enforcement.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local vulnerability enabling bypass of security controls and arbitrary code execution due to improper privilege management directly maps to exploitation for privilege escalation (T1068) and defense evasion (T1211).
NVD Description
A vulnerability in the Trend Micro Apex One Security Agent Plug-in User Interface Manager could allow a local attacker to bypass existing security and execute arbitrary code on affected installations. Please note: an attacker must first obtain the ability to…
more
execute low-privileged code on the target system in order to exploit this vulnerability.
Deeper analysisAI
CVE-2024-58104 is a vulnerability in the Trend Micro Apex One Security Agent Plug-in User Interface Manager that could allow a local attacker to bypass existing security controls and execute arbitrary code on affected installations. Published on 2025-03-25, it carries a CVSS v3.1 base score of 7.3 (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) and maps to CWE-269 (Improper Privilege Management).
Exploitation requires an attacker to first obtain the ability to execute low-privileged code on the target system, along with local access, low privileges, and user interaction. Successful exploitation enables arbitrary code execution, resulting in high impacts to confidentiality, integrity, and availability.
Trend Micro has published mitigation guidance in their advisory at https://success.trendmicro.com/en-US/solution/KA-0018217.
Details
- CWE(s)