CVE-2023-52337
Trend Micro Deep Security Agent vulnerability analysis and mitigation

Overview

An improper access control vulnerability (CVE-2023-52337) was discovered in Trend Micro Deep Security 20.0 and Trend Micro Cloud One - Endpoint and Workload Security Agent. The vulnerability was reported on July 8, 2022, and publicly disclosed on January 19, 2024. The affected products include various versions of Deep Security Agent 20.0 and related security components (Trend Advisory, ZDI Advisory).

Technical details

The vulnerability exists within the Anti-Malware Solution Platform, where the product applies insufficient access controls to a sensitive folder. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High) with the vector string AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access requirements with low attack complexity and privilege requirements (ZDI Advisory).

Impact

If successfully exploited, this vulnerability allows an attacker to escalate privileges and execute arbitrary code in the context of SYSTEM. This could lead to complete system compromise with high impacts on confidentiality, integrity, and availability of the affected system (ZDI Advisory).

Mitigation and workarounds

Trend Micro has released version 20.0.0-8438 for Windows (20 LTS Update 2023-12-12) to address this vulnerability. Customers are strongly encouraged to update to the latest builds as soon as possible. Additionally, organizations should review remote access to critical systems and ensure policies and perimeter security are up-to-date (Trend Advisory).

Community reactions

The vulnerability was responsibly disclosed by security researcher Abdelhamid Naceri working with Trend Micro's Zero Day Initiative. The coordinated disclosure process took approximately 18 months from initial report to public disclosure (ZDI Advisory).

Additional resources


SourceThis report was generated using AI

Related Trend Micro Deep Security Agent vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-51503HIGH8.8
  • Trend Micro Deep Security AgentTrend Micro Deep Security Agent
  • cpe:2.3:a:trendmicro:deep_security_agent
NoYesNov 19, 2024
CVE-2025-30641HIGH7.8
  • Trend Micro Deep Security AgentTrend Micro Deep Security Agent
  • cpe:2.3:a:trendmicro:deep_security_agent
NoYesJun 17, 2025
CVE-2025-30640HIGH7.8
  • Trend Micro Deep Security AgentTrend Micro Deep Security Agent
  • cpe:2.3:a:trendmicro:deep_security_agent
NoYesJun 17, 2025
CVE-2024-55955HIGH7.3
  • Trend Micro Deep Security AgentTrend Micro Deep Security Agent
  • cpe:2.3:a:trendmicro:deep_security_agent
NoYesDec 31, 2024
CVE-2025-30642MEDIUM5.5
  • Trend Micro Deep Security AgentTrend Micro Deep Security Agent
  • cpe:2.3:a:trendmicro:deep_security_agent:*:*:*:*:long_term_support:*:*:*
NoYesJun 17, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management