Ethical Hacking News
Trend Micro has recently reported two critical vulnerabilities (CVEs) under active exploitation, which have left customers of its Apex One endpoint security platform vulnerable to attacks. The vulnerabilities, identified as CVE-2025-54948 and CVE-2025-54987, both boast a CVSS score of 9.4 and are present in the platform's web-based managed console. In response to this issue, Trend Micro has informed customers using Apex One 2019 Management Server versions 14039 and below that they will not receive a patch until around the middle of August. However, the company has offered an alternative mitigation strategy, which involves disabling the ability for administrators to utilize the Remote Install Agent function to deploy agents from the Trend Micro Apex One Management Console.
Trend Micro has reported two critical vulnerabilities (CVEs) in its Apex One endpoint security platform that are being actively exploited. The vulnerabilities have a CVSS score of 9.4 and allow remote attackers to upload malicious code and execute commands on affected machines. The two flaws are identical, except for their impact on different CPU architectures (x86 and Arm). Trend Micro has advised customers using Apex One 2019 Management Server versions 14039 and below to disable the Remote Install Agent function as a mitigation strategy. Customers can work around this limitation by using a device's UNC path or an agent package to deploy needed software. Security experts recommend restricting management consoles and interfaces to authorized administrators only.
Trend Micro has recently reported two critical vulnerabilities (CVEs) under active exploitation, which have left customers of its Apex One endpoint security platform vulnerable to attacks. The vulnerabilities, identified as CVE-2025-54948 and CVE-2025-54987, both boast a CVSS score of 9.4 and are present in the platform's web-based managed console. According to Trend Micro, remote attackers with access to the management console can exploit these vulnerabilities to upload malicious code and execute commands on affected machines.
It is worth noting that the two flaws are identical, save for their impact on different CPU architectures – namely x86 and Arm. This suggests that the vulnerability exists in a fundamental weakness of the platform rather than being specific to a particular architecture.
In response to this issue, Trend Micro has informed customers using Apex One 2019 Management Server versions 14039 and below that they will not receive a patch until around the middle of August. However, the company has offered an alternative mitigation strategy, which involves disabling the ability for administrators to utilize the Remote Install Agent function to deploy agents from the Trend Micro Apex One Management Console.
Although this fix will fully protect against known exploits, it comes with a caveat – namely that it disables the Remote Install Agent function. Fortunately, customers can work around this limitation by using a device's UNC path or an agent package to deploy needed software until the permanent solution is deployed.
It is also worth noting that security experts recommend that management consoles and interfaces be restricted to authorized and trusted administrators only. This will serve as a crucial first line of defense in preventing exploitation of these vulnerabilities. Moreover, Trend Micro has suggested that customers who have their console's IP address exposed externally should consider mitigating factors such as source restrictions if not already applied.
In other news, the founders of a crypto-mixer service have admitted to laundering more than $200 million in criminal proceeds over the course of several years. The CEO and CTO of Samourai, Keonne Rodriguez and William Lonergan Hill, respectively, pled guilty to one count each of conspiracy to operate a money transmitting business knowing it transmitted the proceeds of crime. As part of their plea deal, they agreed to forfeit nearly $238 million in ill-gotten gains, in addition to their jail sentences.
The fact that these individuals were only facing a maximum of five years apiece despite admitting to laundering such a significant amount of money highlights the complexities and nuances of cryptocurrency-related crimes.
Furthermore, a recent study has found that humans are not completely useless at detecting malware. The study, which involved pinpointing specific software nasties as well as being suspicious of printer drivers, demonstrated that while there is still room for improvement, individuals can play an important role in identifying and mitigating cyber threats.
In other news, Italy has expressed concerns that Meta may be violating a law related to the use of artificial intelligence (AI) in WhatsApp. The competition regulator has suggested that Zuckercorp's actions could amount to abuse of a dominant market position. However, Meta has denied any wrongdoing.
Additionally, Microsoft researchers have made some interesting observations regarding AI security agents. Despite their promising prospects, these agents were found to be vulnerable to certain types of attacks, with 74% of malware slipping through their defenses.
On the other hand, a recent study has shown that AI attacks are already keeping many cybersecurity professionals up at night. The study, conducted by Darktrace, highlights the growing threat posed by artificial intelligence and machine learning (ML) in the realm of cybersecurity.
The use of AI-powered tools for detecting malware is becoming increasingly prevalent, but it remains to be seen whether these tools can effectively counter the rapidly evolving nature of cyber threats.
In conclusion, this article has explored several recent developments in the world of security and cybersecurity. Trend Micro's critical vulnerabilities have left customers vulnerable to attacks, while crypto-mixer founders have admitted to laundering millions of dollars in criminal proceeds. Additionally, humans are not completely useless at detecting malware, AI attacks are keeping many professionals up at night, and Microsoft researchers are working to improve their AI security agents.
Related Information:
https://www.ethicalhackingnews.com/articles/Trend-Micros-Critical-Vulnerability-Exposes-Management-Console-Weakness-ehn.shtml
Published: Sun Aug 10 17:45:39 2025 by llama3.2 3B Q4_K_M