Cyber Posture

CVE-2024-58105

High

Published: 25 March 2025

Published
25 March 2025
Modified
01 August 2025
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0001 1.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-58105 is a high-severity Incorrect User Management (CWE-286) vulnerability in Trendmicro Apex One. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 1.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and correction of flaws like this authorization bypass in the Trend Micro Apex One Security Agent Plug-in, directly mitigated by the vendor-provided patch.

prevent

Mandates enforcement of approved authorizations for logical access, directly countering the missing authorization (CWE-286) that allows low-privileged attackers to bypass security and execute arbitrary code.

prevent

Restricts system access to the least privileges necessary, limiting the scope and impact of arbitrary code execution achieved via the UI Manager bypass even if initial low-privileged access is obtained.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local low-privileged attacker bypasses security controls (missing authorization) to achieve arbitrary code execution with high impact, directly enabling exploitation for privilege escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A vulnerability in the Trend Micro Apex One Security Agent Plug-in User Interface Manager could allow a local attacker to bypass existing security and execute arbitrary code on affected installations. This CVE address an addtional bypass not covered in CVE-2024-58104.…

more

Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Deeper analysisAI

CVE-2024-58105 is a vulnerability in the Trend Micro Apex One Security Agent Plug-in User Interface Manager that could allow a local attacker to bypass existing security controls and execute arbitrary code on affected installations. This issue addresses an additional bypass not covered in CVE-2024-58104 and is associated with CWE-286 (Missing Authorization). The vulnerability has a CVSS v3.1 base score of 7.3 (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).

To exploit this vulnerability, an attacker must first obtain the ability to execute low-privileged code on the target system. A local attacker with low privileges (PR:L) and requiring user interaction (UI:R) can then leverage low attack complexity (AC:L) to bypass security mechanisms, achieving arbitrary code execution with high impacts to confidentiality, integrity, and availability.

The Trend Micro advisory provides details on mitigation and patches at https://success.trendmicro.com/en-US/solution/KA-0018217.

Details

CWE(s)

Affected Products

trendmicro
apex one
≤ 14.0.14203 · ≤ 2019.13140

CVEs Like This One

CVE-2024-58104Same product: Trendmicro Apex One
CVE-2025-54948Same product: Trendmicro Apex One
CVE-2025-54987Same product: Trendmicro Apex One
CVE-2026-35638Shared CWE-286
CVE-2025-69258Same vendor: Trendmicro
CVE-2025-7972Shared CWE-286
CVE-2025-53378Same vendor: Trendmicro
CVE-2025-69260Same vendor: Trendmicro
CVE-2025-69259Same vendor: Trendmicro
CVE-2022-28339Same vendor: Trendmicro

References