Plattform
other
Komponente
trend-vision-one
Behoben in
NA
CVE-2025-31285 identifies a broken access control vulnerability within the Trend Vision One Role Name component. This flaw allowed an administrator to create users with the potential to escalate privileges by modifying account roles. While the vulnerability has been addressed on the backend service, it highlights the importance of robust access control management within security platforms. Affected versions include those prior to the fix.
The primary impact of CVE-2025-31285 lies in the potential for privilege escalation. A malicious actor, or even a compromised administrator, could leverage this vulnerability to create user accounts and then manipulate their roles, granting themselves elevated access to Trend Vision One's functionalities. This could lead to unauthorized data access, configuration changes, and potentially complete control over the security platform. The blast radius extends to any data or systems managed by Trend Vision One, depending on the privileges gained. While the vulnerability is no longer active, understanding its potential impact is crucial for assessing past risks and reinforcing security practices.
CVE-2025-31285 was disclosed on April 2, 2025. There are currently no publicly available proof-of-concept exploits. The vulnerability is not listed on the CISA KEV catalog. Given the backend fix, the probability of exploitation is considered low.
Organizations relying on Trend Vision One for security management are at risk, particularly those with legacy installations or those who have not yet applied the backend service update. Shared hosting environments utilizing Trend Vision One may also be vulnerable if access controls are not properly segmented.
disclosure
Exploit-Status
EPSS
0.13% (33% Perzentil)
CISA SSVC
CVSS-Vektor
Although the vulnerability has been addressed on the backend service, proactive security measures remain essential. Review all user roles and permissions within Trend Vision One to ensure adherence to the principle of least privilege. Implement multi-factor authentication (MFA) for all administrator accounts to mitigate the risk of compromised credentials. Regularly audit user activity logs for any suspicious behavior indicative of unauthorized access attempts. While a specific rollback isn't applicable given the backend fix, continuous monitoring and security best practices are paramount.
Este problema ya ha sido solucionado en el servicio backend. No se requiere ninguna acción por parte del usuario.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-31285 is a medium-severity vulnerability in Trend Vision One allowing privilege escalation via role manipulation. An administrator could create users to gain elevated access.
If you are using Trend Vision One versions prior to the backend service fix, you may be affected. Verify the backend service update has been applied.
The vulnerability has been addressed on the backend service. Ensure the backend service update has been successfully applied and review user access controls.
While the vulnerability is no longer considered active due to the backend service fix, the potential for exploitation in unpatched environments remains.
Refer to the official Trend Micro security advisory for CVE-2025-31285 for detailed information and remediation steps.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.