Plattform
other
Komponente
trend-vision-one
Behoben in
NA
CVE-2025-31284 identifies a broken access control vulnerability within the Trend Vision One Status component. This flaw allowed an administrator to create users with the ability to modify account roles, ultimately leading to privilege escalation. While the issue has been addressed on the backend service, understanding the potential impact and verifying existing access controls remains crucial for maintaining a secure environment. Affected versions include those prior to the fix.
The core impact of CVE-2025-31284 lies in the ability for a malicious actor, or a compromised administrator, to elevate their privileges within the Trend Vision One system. By creating users and manipulating their roles, an attacker could gain unauthorized access to sensitive data, modify system configurations, or even take complete control of the platform. This could lead to data breaches, system disruption, and significant reputational damage. The potential blast radius extends to any data or systems managed by Trend Vision One, depending on the privileges gained.
CVE-2025-31284 was publicly disclosed on April 2, 2025. While the vulnerability is no longer considered active due to the backend service fix, the potential for exploitation prior to the patch highlights the importance of timely security updates. No public proof-of-concept (POC) code has been released, and there are no indications of active exploitation campaigns. The vulnerability is not currently listed on the CISA KEV catalog.
Organizations utilizing Trend Vision One, particularly those with multiple administrators or complex user role structures, are at risk. Legacy configurations with default or overly permissive access controls are especially vulnerable. Shared hosting environments where multiple tenants share a Trend Vision One instance should also be scrutinized.
disclosure
Exploit-Status
EPSS
0.13% (33% Perzentil)
CISA SSVC
CVSS-Vektor
Although the vulnerability has been addressed on the backend service, proactive security measures are still recommended. First, thoroughly review and audit existing user accounts and their assigned roles within Trend Vision One. Ensure that the principle of least privilege is enforced, granting users only the necessary permissions for their tasks. Implement multi-factor authentication (MFA) to add an extra layer of security. Regularly monitor system logs for any suspicious activity related to user creation or role modifications. After verifying the backend service fix, confirm by reviewing access control lists and user permissions to ensure they align with security policies.
Este problema ya ha sido solucionado en el servicio backend de Trend Vision One. No se requiere ninguna acción por parte del usuario.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-31284 is a medium severity vulnerability in Trend Vision One where an administrator could create users to escalate privileges. The backend service has been fixed, rendering it inactive.
If you are using a version of Trend Vision One prior to the backend service fix, you were potentially affected. Verify your system's configuration and access controls.
The vulnerability has been addressed on the backend service. Review user roles, enforce least privilege, and implement MFA for enhanced security.
There are no indications of active exploitation campaigns for CVE-2025-31284, as the vulnerability is no longer considered active.
Refer to the official Trend Micro security advisory for CVE-2025-31284 for detailed information and updates.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.