Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Trend Micro Cures Two Critical Flaws in Apex One Advanced Endpoint Security Solution



Trend Micro has addressed two critical vulnerabilities in its Apex One advanced endpoint security solution, which could allow attackers to achieve remote code execution on vulnerable Windows systems. The company urges customers to apply the patches promptly to protect their environments from compromise.

  • Trend Micro has addressed two critical remote code execution flaws in its Apex One solution, CVE-2025-71210 and CVE-2025-71211.
  • The vulnerabilities allow attackers to upload malicious code and execute commands on affected systems.
  • A patch is available for download, and SaaS versions have already been mitigated.
  • Users of Apex One are advised to apply the patches as soon as possible to prevent potential exploitation.



  • Trend Micro has recently taken steps to address two critical vulnerabilities in its Apex One advanced endpoint security solution, which has left many users scrambling to apply the patches and prevent potential exploitation. The move comes after researchers from CoreCloud Tech discovered two remote code execution flaws (CVE-2025-71210 and CVE-2025-71211) that could allow attackers to upload malicious code and execute commands on affected systems.

    The first vulnerability, tracked as CVE-2025-71210, is a Console Directory Traversal Remote Code Execution issue with a CVSS score of 9.8. According to the advisory from Trend Micro, this vulnerability allows an attacker to upload malicious code via the management console, potentially leading to unauthorized access and command execution on affected installations. Furthermore, customers that have their console's IP address exposed externally are advised to consider mitigating factors such as source restrictions if they have not already been applied.

    The second vulnerability, CVE-2025-71211, also falls under the Console Directory Traversal Remote Code Execution category with a CVSS score of 9.8. The report states that this vulnerability is similar in scope to CVE-2025-71210 but impacts a different executable, presenting another potential entry point for malicious actors.

    In order to address these vulnerabilities, Trend Micro has released Critical Patch Build 14136, which includes fixes for the two identified remote code execution flaws. It's worth noting that SaaS versions of Apex One have already been mitigated, and no customer action is required in this regard.

    Apart from the remote code execution flaws, Trend Micro also addressed four high-severity privilege escalation flaws (CVE-2025-71212: Scan Engine Link Following Local Privilege Escalation Vulnerability, CVE-2025-71213: Origin Validation Error Local Privilege Escalation Vulnerability) in the Windows agent. Furthermore, the cybersecurity firm fixed issues impacting the macOS agent, although details regarding these issues are not provided.

    The Trend Micro Apex One solution is an all-in-one advanced endpoint security solution that offers various features such as ransomware protection, zero-day threat defense, EDR, predictive machine learning, DLP, and virtual patching via a single agent. With this latest update, the company has reinforced its commitment to ensuring the security of its customers' systems.

    Researchers Jacky Hsieh and Charles Yang from CoreCloud Tech reported both flaws through TrendAI's Zero Day Initiative. The SaaS versions have already been mitigated, indicating that immediate action was taken to address these vulnerabilities.

    It is essential for users of Apex One to apply the patches as soon as possible in order to prevent potential exploitation by malicious actors.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Trend-Micro-Cures-Two-Critical-Flaws-in-Apex-One-Advanced-Endpoint-Security-Solution-ehn.shtml

  • https://securityaffairs.com/188572/security/trend-micro-fixes-two-critical-flaws-in-apex-one.html

  • https://www.bleepingcomputer.com/news/security/trend-micro-warns-of-critical-apex-one-rce-vulnerabilities/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-71210

  • https://www.cvedetails.com/cve/CVE-2025-71210/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-71211

  • https://www.cvedetails.com/cve/CVE-2025-71211/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-71212

  • https://www.cvedetails.com/cve/CVE-2025-71212/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-71213

  • https://www.cvedetails.com/cve/CVE-2025-71213/


  • Published: Thu Feb 26 17:25:18 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us