Trend Micro OfficeScan Flaw Apparently Exploited in Mitsubishi Electric Hack

A cyberattack disclosed recently by Mitsubishi Electric, which resulted in hackers gaining access to the company’s network and stealing corporate data, likely involved exploitation of a vulnerability in Trend Micro’s OfficeScan product.


Discovered in June 2019 but disclosed only last week, the data breach impacted both employee and corporate data at the Japanese company, affecting over 8,000 people. Technical materials, sales materials, and other trade secrets were also stolen.


Mitsubishi Electric is a top contractor for Japan’s military and infrastructure, but the company said in its data breach notice that no infrastructure-related information was impacted in the hack.


At the time, the company also revealed that the hackers were able to compromise its systems through an unpatched vulnerability in an anti-virus program, but refrained from providing specific information about the affected product.


Recent reports from Japanese media, however, suggest that Trend Micro’s OfficeScan endpoint protection product might have been the culprit.


Moreover, they suggest that the hackers targeted CVE-2019-18187, an arbitrary file upload with directory traversal flaw in OfficeScan 11.0 SP1 and XG, which could be abused to achieve remote code execution (RCE).


“The remote process execution is bound to a web service account, which depending on the web platform used may have restricted permissions. An attempted attack requires user authentication,” Trend Micro explained in an advisory last year.


At the time, the security company also revealed that the vulnerability was being actively targeted in the wild, but noted that an attack would require several specific conditions to be met.


“Exploiting these type of ..

Support the originator by clicking the read the rest link below.