{"api_version":"1","generated_at":"2026-04-23T02:37:08+00:00","cve":"CVE-2023-41179","urls":{"html":"https://cve.report/CVE-2023-41179","api":"https://cve.report/api/cve/CVE-2023-41179.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-41179","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-41179"},"summary":{"title":"Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability","description":"A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Free Business Security Services could allow an attacker to manipulate the module to execute arbitrary commands on an affected installation.\r\n\r\nNote that an attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.","state":"PUBLIC","assigner":"security@trendmicro.com","published_at":"2023-09-19 14:15:00","updated_at":"2023-09-22 15:08:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://jvn.jp/en/vu/JVNVU90967486/","name":"https://jvn.jp/en/vu/JVNVU90967486/","refsource":"MISC","tags":[],"title":"JVNVU#90967486: Trend Micro Endpoint security products for enterprises vulnerable to arbitrary code execution","mime":"text/xml","httpstatus":"200","archivestatus":"404"},{"url":"https://success.trendmicro.com/solution/000294994","name":"https://success.trendmicro.com/solution/000294994","refsource":"MISC","tags":[],"title":"DCX","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://success.trendmicro.com/jp/solution/000294706","name":"https://success.trendmicro.com/jp/solution/000294706","refsource":"MISC","tags":[],"title":"Q&A | Trend Micro Business Support","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-41179","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-41179","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"41179","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"41179","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trendmicro","cpe5":"apex_one","cpe6":"2019","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"41179","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trendmicro","cpe5":"apex_one","cpe6":"2019","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"saas","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"41179","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trendmicro","cpe5":"worry-free_business_security","cpe6":"10.0","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"41179","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trendmicro","cpe5":"worry-free_business_security_services","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"saas","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2023","cve_id":"41179","cve":"CVE-2023-41179","vendorProject":"Trend Micro","product":"Apex One and Worry-Free Business Security","vulnerabilityName":"Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability","dateAdded":"2023-09-21","shortDescription":"Trend Micro Apex One and Worry-Free Business Security contain an unspecified vulnerability in the third-party anti-virus uninstaller that could allow an attacker to manipulate the module to conduct remote code execution. An attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.","requiredAction":"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.","dueDate":"2023-10-12","knownRansomwareCampaignUse":"Unknown","notes":"https://success.trendmicro.com/dcx/s/solution/000294994?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-41179","cwes":"","catalogVersion":"2026.04.22","updated_at":"2026-04-22 20:03:10"},"epss":{"cve_year":"2023","cve_id":"41179","cve":"CVE-2023-41179","epss":"0.022330000","percentile":"0.845740000","score_date":"2026-04-22","updated_at":"2026-04-23 00:03:16"},"legacy_qids":[{"cve":"CVE-2023-41179","qid":"378868","title":"Trend Micro Apex One Arbitrary Code Execution Vulnerability (000294994)"},{"cve":"CVE-2023-41179","qid":"378977","title":"Trend Micro Worry-Free Business Security (WFBS) Arbitrary Code Execution Vulnerability (000294994)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-41179","ASSIGNER":"security@trendmicro.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Free Business Security Services could allow an attacker to manipulate the module to execute arbitrary commands on an affected installation.\r\n\r\nNote that an attacker must first obtain administrative console access on the target system in order to exploit this vulnerability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Trend Micro, Inc.","product":{"product_data":[{"product_name":"Trend Micro Apex One","version":{"version_data":[{"version_affected":"<","version_name":"2019 (14.0)","version_value":"14.0.0.12380"},{"version_affected":"<","version_name":"SaaS\t","version_value":"14.0.12637"}]}},{"product_name":"Trend Micro Worry-Free Business Security","version":{"version_data":[{"version_affected":"<","version_name":"10.0 SP1","version_value":"10.0 SP1 Build 2495"}]}},{"product_name":"Trend Micro Worry-Free Business Security Services","version":{"version_data":[{"version_affected":"<","version_name":"SaaS","version_value":"6.7.3578 / 14.3.1105 "}]}}]}}]}},"references":{"reference_data":[{"url":"https://success.trendmicro.com/solution/000294994","refsource":"MISC","name":"https://success.trendmicro.com/solution/000294994"},{"url":"https://success.trendmicro.com/jp/solution/000294706","refsource":"MISC","name":"https://success.trendmicro.com/jp/solution/000294706"},{"url":"https://jvn.jp/en/vu/JVNVU90967486/","refsource":"MISC","name":"https://jvn.jp/en/vu/JVNVU90967486/"}]}},"nvd":{"publishedDate":"2023-09-19 14:15:00","lastModifiedDate":"2023-09-22 15:08:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:saas:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:trendmicro:worry-free_business_security:10.0:sp1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:trendmicro:worry-free_business_security_services:-:*:*:*:saas:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":null,"notes":[]}}}