Security vulnerability found on Trend Micro Apex One
A security vulnerability was found on Trend Micro Apex One, allowing hackers to perform RCE.
Cybersecurity is a very important part of the protection system that keeps the overall system safe from malware and hackers, but if the protection system has a weakness or a security vulnerability, it can also cause harm.
According to a report by the website, Igor's Lab has mentioned the detection of security vulnerabilities on up to four Trend Micro Apex One enterprise cybersecurity software. These vulnerabilities allow hackers to remotely launch code or RCE (Remote Code Execution) and increase their Privilege Escalation. The group of security vulnerabilities will be divided into two groups:
Vulnerability for RCE
These security vulnerabilities are loopholes in the management console of the Windows version of Trend Micro Apex One, which contains CVE-2025-71210 and CVE-2025-71211 loopholes, both of which have serious scores, or CVSS, of up to 9.8, which is a critical level. These two vulnerabilities are all Path Traversal vulnerabilities, or vulnerabilities that allow hackers to modify the destination folder instead of the destination folder that the vulnerable software has defined to place malware in critical system folders, leading to opportunities. RCE to embed malware onto system key folders as mentioned above.
Yet, to use this vulnerability, hackers must first access the console. This may be done by hacking to access the console via the Internet, or directly through the victim's page. It is difficult to use, but if the console is accessible via the Internet, it is still a risk. Therefore, the source recommends that the console be able to enter only the LAN of the internal system to reduce any risk, as well as to update all updates immediately.
.
Vulnerability for upgrading system access rights
For this security vulnerability, there are two, but they are slightly different in detail.
CVE-2025-71212 (CVSS rating of 7.8) is a vulnerability in part to an error in the use of Follow Link within the scanner (Scan Engine), which will lead to the upgrade of the system access permissions.
CVE-2025-71213 (CVSS rating of 7.8) is an Source Validation vulnerability that does not work properly, which will lead to an upgrade of the system access right.
.
Vulnerability on macOS version
In addition to the vulnerability of the Windows version of the software, the macOS version is also affected. The vulnerability is not thoroughly identified by the source as a vulnerability caused by a system error at any point, but it is concluded that these vulnerabilities can lead to a hacker upgrade of the license. The vulnerability is as follows:
CVE-2025-71215, CVE-2025-71216, CVE-2025-71217 (CVSS rating of 7.8)
CVE-2025-71214 (CVSS rating of 7.2)
The affected version will be the on-site installed version of the Apex One 2019 or On Premise software that requires a low upgrade to CP Build 14136, while the Apex One as a Service version is not affected at all, and the Trend Vision One Endpoint Security with Security Agent version 14.0.2031 5 has been completely closed.
# Trending # New technology # Lemon 8 Howtoo # lemon 8 diary # freedomhack
























































































