Impact
A time‑of‑check/time‑of‑use race condition exists in the Apex One/SEP agent, allowing a local attacker who has already executed low‑privileged code to elevate their privileges. The flaw is classified as CWE‑367. The vulnerability does not provide remote access; it relies on local code execution to be exploitable.
Affected Systems
Trend Micro, Inc. products TrendAI Apex One and TrendAI Apex One as a Service are affected. The disclosed vulnerable versions are Apex One 14.0.0.17079 and Apex One as a Service 14.0.0.20731.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity. EPSS data is not available, so the likelihood of exploitation cannot be quantified, and the vulnerability is not listed in the CISA KEV catalog. Attackers must gain local code execution first, making the attack vector local and requiring the prerequisite of running code with low privileges.
OpenCVE Enrichment