### [CVE-2021-36742](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36742) ![](https://img.shields.io/static/v1?label=Product&message=Trend%20Micro%20Apex%20One&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Trend%20Micro%20OfficeScan&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Trend%20Micro%20Worry-Free%20Business%20Security&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=10.0%20SP1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=2019%2C%20SaaS%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=XG%20SP1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Local%20Privilege%20Escalation&color=brightgreen) ### Description A improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG and Worry-Free Business Security 10.0 SP1 allows a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/v-p-b/avpwn