Plattform
other
Komponente
trend-vision-one
Behoben in
NA
CVE-2025-31282 describes a broken access control vulnerability within the Trend Vision One User Account component. This flaw allowed an administrator to create user accounts and subsequently modify their roles, potentially leading to privilege escalation and unauthorized access. While the vulnerability has been addressed on the backend service, it highlights the importance of robust access control mechanisms within security management platforms. Affected versions include those prior to the fix.
The primary impact of CVE-2025-31282 lies in the potential for privilege escalation. A malicious actor, or even a compromised administrator, could exploit this vulnerability to create new user accounts with elevated privileges. This could grant them access to sensitive data, configuration settings, and potentially even full control over the Trend Vision One system. The blast radius extends to any data or systems managed by Trend Vision One, as an attacker could leverage these elevated privileges to perform unauthorized actions and compromise the overall security posture. While the backend service has been patched, legacy installations or misconfigured systems could still be at risk.
CVE-2025-31282 was publicly disclosed on April 2, 2025. There is no indication of active exploitation or a KEV listing at the time of writing. Public proof-of-concept (POC) code is currently unavailable. The vendor has confirmed that the backend service has been patched, mitigating the immediate risk, but older versions or misconfigured deployments may still be vulnerable.
Organizations utilizing Trend Vision One, particularly those with legacy configurations or deployments where user account management practices may not adhere to security best practices, are at risk. Shared hosting environments where multiple administrators share access to the Trend Vision One platform could also be vulnerable.
disclosure
Exploit-Status
EPSS
0.13% (33% Perzentil)
CISA SSVC
CVSS-Vektor
Although the vulnerability has been addressed on the backend service, it's crucial to review and strengthen access control configurations within Trend Vision One. Implement the principle of least privilege, ensuring users only have the necessary permissions to perform their tasks. Regularly audit user accounts and their associated roles to identify and remove any unnecessary privileges. Consider implementing multi-factor authentication (MFA) to add an extra layer of security. Verify that all Trend Vision One instances are running the latest available version, even if the backend service has been patched, to ensure all components are protected. After upgrade, confirm by reviewing user account roles and permissions.
Este problema ya ha sido solucionado en el servicio backend de Trend Vision One. No se requiere ninguna acción por parte del usuario.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-31282 is a medium severity vulnerability in Trend Vision One allowing administrators to escalate privileges by manipulating user roles. It affects versions ≤NA, though the backend service has been fixed.
If you are using Trend Vision One versions prior to the backend service fix (≤NA), you were potentially affected. However, the vulnerability is no longer considered active.
While a specific version is not provided, focus on reviewing and strengthening access control configurations, enforcing least privilege, and implementing MFA.
No active exploitation has been confirmed. The vulnerability has been addressed on the backend service, significantly reducing the risk.
Refer to Trend Micro's security advisory page for the latest information and updates regarding CVE-2025-31282.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.