{"uuid": "8ef2b3b1-0e5a-4c28-91ab-a1a1fbae54e1", "vulnerability": {"vulnId": "CVE-2023-41179", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "8ef2b3b1-0e5a-4c28-91ab-a1a1fbae54e1"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2023-09-21T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2023-09-21T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2023-09-21T00:00:00Z"}, "scope": {"notes": "KEV entry: Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability | Affected: Trend Micro / Apex One and Worry-Free Business Security | Description: Trend Micro Apex One and Worry-Free Business Security contain an unspecified vulnerability in the third-party anti-virus uninstaller that could allow an attacker to manipulate the module to conduct remote code execution. An attacker must first obtain administrative console access on the target system in order to exploit this vulnerability. | Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Due date: 2023-10-12 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://success.trendmicro.com/dcx/s/solution/000294994?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-41179"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": [], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Apex One and Worry-Free Business Security", "due_date": "2023-10-12", "date_added": "2023-09-21", "vendorProject": "Trend Micro", "vulnerabilityName": "Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2023-41179", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-41179"}]}
