Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

U.S. CISA Adds Trend Micro Apex One and Langflow Flaws to its Known Exploited Vulnerabilities Catalog: A Growing Concern for Cybersecurity




The U.S. CISA has added Trend Micro Apex One and Langflow flaws to its Known Exploited Vulnerabilities catalog, highlighting the ongoing threat landscape and the need for vigilance in cybersecurity. These vulnerabilities pose significant risks if left unaddressed, as they have already been exploited by known APT groups. CISA's efforts to mitigate the risk of known exploited vulnerabilities are crucial in protecting federal agencies and critical infrastructure from cyber threats.

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added Trend Micro Apex One and Langflow flaws to its Known Exploited Vulnerabilities catalog.
  • CVE-2025-34291, a Langflow flaw, allows attackers to execute arbitrary code and achieve full system compromise, while CVE-2026-34926, a Trend Micro Apex One flaw, allows local attackers to modify server tables and inject malicious code.
  • CISA has ordered federal agencies to address these vulnerabilities by June 4, 2026, as part of its Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities.
  • Private organizations are urged to review the catalog and prioritize patching and vulnerability remediation to maintain a robust security posture.



  • Cybersecurity is an ever-evolving field, with new threats emerging every day. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has taken a significant step in addressing these concerns by adding Trend Micro Apex One and Langflow flaws to its Known Exploited Vulnerabilities catalog. This move is part of the agency's efforts to protect federal agencies and critical infrastructure from cyber threats.

    The addition of these two flaws to the catalog comes after a thorough analysis of the vulnerabilities by CISA experts. The first flaw, CVE-2025-34291, is an origin validation error issue in Langflow that allows attackers to execute arbitrary code and achieve full system compromise. This vulnerability has already been exploited by an Iran-nexus APT group, known as MuddyWater, which used it to gain initial access to target networks.

    The second flaw, CVE-2026-34926, is a directory traversal issue in on-premise Trend Micro Apex One that allows local attackers to modify server tables and inject malicious code to affected agents. This vulnerability has also been actively exploited in the wild, with at least one instance observed by CISA experts.

    CISA has ordered federal agencies to address these vulnerabilities by June 4, 2026, as part of its Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities. This directive requires agencies to prioritize the remediation of identified vulnerabilities to protect their networks against attacks exploiting the flaws in the catalog.

    Experts recommend that private organizations review the Catalog and address these vulnerabilities in their infrastructure, as they have already done for federal agencies. The importance of timely patching cannot be overstated, as delayed fixes can lead to catastrophic consequences for an organization's security posture.

    The addition of these two flaws to the Known Exploited Vulnerabilities catalog highlights the ongoing threat landscape and the need for vigilance in cybersecurity. It also underscores the critical role that CISA plays in protecting national security and critical infrastructure from cyber threats.

    In conclusion, the inclusion of Trend Micro Apex One and Langflow flaws in the U.S. CISA's Known Exploited Vulnerabilities catalog serves as a reminder of the ongoing nature of the threat landscape. As cybersecurity experts, it is essential to stay informed about emerging vulnerabilities and take proactive measures to address them. By prioritizing patching and vulnerability remediation, organizations can significantly reduce their risk exposure and maintain a robust security posture.

    Summary:

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added Trend Micro Apex One and Langflow flaws to its Known Exploited Vulnerabilities catalog in an effort to protect federal agencies and critical infrastructure from cyber threats. These vulnerabilities, CVE-2025-34291 and CVE-2026-34926, pose significant risks if left unaddressed, as they have already been exploited by known APT groups. CISA has ordered federal agencies to address these vulnerabilities by June 4, 2026, as part of its efforts to mitigate the risk of known exploited vulnerabilities. Organizations are urged to review the catalog and prioritize patching and vulnerability remediation to maintain a robust security posture.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/US-CISA-Adds-Trend-Micro-Apex-One-and-Langflow-Flaws-to-its-Known-Exploited-Vulnerabilities-Catalog-A-Growing-Concern-for-Cybersecurity-ehn.shtml

  • https://securityaffairs.com/192529/hacking/u-s-cisa-adds-trend-micro-apex-one-and-langflow-to-its-known-exploited-vulnerabilities-catalog.html

  • https://thehackernews.com/2026/05/cisa-adds-exploited-langflow-and-trend.html

  • https://nvd.nist.gov/vuln/detail/CVE-2025-34291

  • https://www.cvedetails.com/cve/CVE-2025-34291/

  • https://nvd.nist.gov/vuln/detail/CVE-2026-34926

  • https://www.cvedetails.com/cve/CVE-2026-34926/


  • Published: Fri May 22 05:58:26 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us