CVE-2000-0204: The Trend Micro OfficeScan client allows remote attackers to cause a denial of service by making 5 c
The Trend Micro OfficeScan client allows remote attackers to cause a denial of service by making 5 connections to port 12345, which raises CPU utilization to 100%.
AI Analysis
Technical Summary
CVE-2000-0204 is a vulnerability found in Trend Micro OfficeScan client version 3.5, a widely used endpoint security solution. The flaw allows remote attackers to cause a denial of service (DoS) condition by establishing five connections to the client’s TCP port 12345. This action triggers a spike in CPU utilization to 100%, effectively rendering the client machine unresponsive or severely degraded in performance. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no authentication required (Au:N), and impacts availability only (A:P), with no confidentiality or integrity loss. Although the vulnerability is relatively old (published in 2000), it remains relevant for legacy systems still running this version of OfficeScan. A patch is available from Trend Micro to remediate this issue, which should be applied promptly to prevent exploitation. No known exploits have been reported in the wild, but the simplicity of the attack makes it a potential risk if unpatched systems are exposed to untrusted networks.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to availability of endpoint security infrastructure. If exploited, it could cause critical security clients to become unresponsive, potentially disabling malware detection and response capabilities on affected endpoints. This could open a window for further attacks or malware infections. Organizations relying on Trend Micro OfficeScan 3.5 in legacy environments, especially those with remote or distributed workforces, may experience operational disruptions. The denial of service could also impact compliance with security policies and regulations that mandate continuous endpoint protection. While the vulnerability does not directly compromise data confidentiality or integrity, the resulting service disruption can indirectly increase risk exposure. Given the age of the vulnerability, modern deployments are unlikely to be affected, but legacy systems in sectors such as manufacturing, critical infrastructure, or government agencies may still be at risk.
Mitigation Recommendations
European organizations should immediately verify if any endpoints are running Trend Micro OfficeScan version 3.5. If so, they must apply the official patch provided by Trend Micro (links: http://www.antivirus.com/download/ofce_patch_35.htm) to remediate the vulnerability. Network-level controls should be implemented to restrict access to TCP port 12345 from untrusted or external networks, using firewalls or intrusion prevention systems. Monitoring network traffic for unusual connection attempts to this port can help detect potential exploitation attempts. Organizations should also consider upgrading to a supported and current version of Trend Micro OfficeScan or alternative endpoint protection solutions to eliminate legacy vulnerabilities. Regular vulnerability assessments and endpoint audits will help identify outdated software versions and reduce attack surface. Finally, endpoint hardening and network segmentation can limit the impact of any denial of service attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2000-0204: The Trend Micro OfficeScan client allows remote attackers to cause a denial of service by making 5 c
Description
The Trend Micro OfficeScan client allows remote attackers to cause a denial of service by making 5 connections to port 12345, which raises CPU utilization to 100%.
AI-Powered Analysis
Technical Analysis
CVE-2000-0204 is a vulnerability found in Trend Micro OfficeScan client version 3.5, a widely used endpoint security solution. The flaw allows remote attackers to cause a denial of service (DoS) condition by establishing five connections to the client’s TCP port 12345. This action triggers a spike in CPU utilization to 100%, effectively rendering the client machine unresponsive or severely degraded in performance. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no authentication required (Au:N), and impacts availability only (A:P), with no confidentiality or integrity loss. Although the vulnerability is relatively old (published in 2000), it remains relevant for legacy systems still running this version of OfficeScan. A patch is available from Trend Micro to remediate this issue, which should be applied promptly to prevent exploitation. No known exploits have been reported in the wild, but the simplicity of the attack makes it a potential risk if unpatched systems are exposed to untrusted networks.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to availability of endpoint security infrastructure. If exploited, it could cause critical security clients to become unresponsive, potentially disabling malware detection and response capabilities on affected endpoints. This could open a window for further attacks or malware infections. Organizations relying on Trend Micro OfficeScan 3.5 in legacy environments, especially those with remote or distributed workforces, may experience operational disruptions. The denial of service could also impact compliance with security policies and regulations that mandate continuous endpoint protection. While the vulnerability does not directly compromise data confidentiality or integrity, the resulting service disruption can indirectly increase risk exposure. Given the age of the vulnerability, modern deployments are unlikely to be affected, but legacy systems in sectors such as manufacturing, critical infrastructure, or government agencies may still be at risk.
Mitigation Recommendations
European organizations should immediately verify if any endpoints are running Trend Micro OfficeScan version 3.5. If so, they must apply the official patch provided by Trend Micro (links: http://www.antivirus.com/download/ofce_patch_35.htm) to remediate the vulnerability. Network-level controls should be implemented to restrict access to TCP port 12345 from untrusted or external networks, using firewalls or intrusion prevention systems. Monitoring network traffic for unusual connection attempts to this port can help detect potential exploitation attempts. Organizations should also consider upgrading to a supported and current version of Trend Micro OfficeScan or alternative endpoint protection solutions to eliminate legacy vulnerabilities. Regular vulnerability assessments and endpoint audits will help identify outdated software versions and reduce attack surface. Finally, endpoint hardening and network segmentation can limit the impact of any denial of service attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Patch Information
Threat ID: 682ca32db6fd31d6ed7df899
Added to database: 5/20/2025, 3:43:41 PM
Last enriched: 7/1/2025, 1:26:09 AM
Last updated: 7/26/2025, 8:21:41 AM
Views: 11
Related Threats
CVE-2025-8830: OS Command Injection in Linksys RE6250
MediumCarmaker’s Portal Vulnerability Could Have Allowed Hackers to Unlock Vehicles and Access Data
MediumCVE-2025-8285: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
MediumCVE-2025-54463: CWE-754: Improper Check for Unusual or Exceptional Conditions in Mattermost Mattermost Confluence Plugin
MediumCVE-2025-54458: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.