Urgent: two critical failures in Trend Micro Apex One allow remote code execution; apply the patch now

Published 4 min de lectura 146 reading

This week Trend Micro released patches for two critical failures on its Apex One endpoint protection platform that, if not corrected, allow an attacker to run code remotely on vulnerable Windows teams. These are vulnerabilities in the management console that take advantage of a weak route path (path traversal) and, under certain conditions, open the door to remote code execution.

Apex One is the security suite many organizations use to detect and respond to threats such as malware, spyware and malicious tools in stations and servers. When the management console has a failure in file route management, an attacker can force reading or writing outside the intended directories and, in combination with other conditions, turn that lack of control into a remote execution. Trend Micro describes the two failures in his technical notice, which affect different executables of the console and have been labeled as CVE-2025-71210 and CVE-2025-71211. More technical information and official recommendations are available in the company's statement: Trend Micro: advice on Apex One.

Urgent: two critical failures in Trend Micro Apex One allow remote code execution; apply the patch now
Image generated with IA.

From Trend Micro's note it is further indicated that successful exploitation requires access to the management console. In practice this means that instances whose IP of administration is accessible from the Internet have a higher risk, and therefore the company suggests complementary measures such as restricting the sources that can connect to the console while applying the patch. Although the firm notes that no holdings of these wild-state vulnerabilities have been observed at this time, its recent record shows that the failures in Apex One administration components have been targeted by attackers on several occasions.

To solve these faults Trend Micro updated the SaaS versions of Apex One and published the Critical Patch Build 14136 for managed facilities, which also fixes two privilege scaling vulnerabilities in the Windows agent and four additional problems in the MacOS agent. If you manage local instances, it is important to apply this patch; if you use the SaaS mode, check that your environment is already in the last build. The official notice explains the affected steps and versions: see advice of Trend Micro.

The record of past incidents shows that it is not an exaggeration to take these warnings seriously. Other Apex One failures have been previously exploited and several entries linked to the solution appear in the catalogue of vulnerabilities exploited by real actors maintained by the United States Infrastructure and Cybersecurity Agency (CISA). Currently CISA lists ten vulnerabilities of Trend Micro Apex that have been identified as exploited in real environments; consulting it helps contextualize the frequency and impact of this type of problem: CISA: Known Exploited Vulnerabilities (Trend Micro Apex).

Urgent: two critical failures in Trend Micro Apex One allow remote code execution; apply the patch now
Image generated with IA.

If you manage Apex One-protected equipment it is appropriate to prioritize several actions: check immediately if the management console is exposed to external networks, apply IP or VPN access restrictions if not in force, update to the last build recommended by Trend Micro and review the records and telemetry to detect unusual activity around the console and agents. Complementary safety at the network level, such as segmentation and the principle of lower privilege in management accounts, reduces the likelihood that such vulnerability will become a greater intrusion.

To better understand why a route travel failure can be so dangerous, it helps to review resources on this type of attack: the basic concept is that the software trusts user-controlled file routes and does not correctly validate entries that allow you to escape from the intended directory. Training resources such as OWASP documentation explain the problem and generic mitigation: OWASP: Path Traversal.

In short, although there is no public evidence of mass exploitation on this occasion, the conditions described by Trend Micro make the update a priority. Update console and agents, limit administrative access from unreliable networks and monitor platform activity are the immediate measures that can make the difference between a patch applied on time and a gap with broad consequences.

Coverage

Related

More news on the same subject.