Site icon TheCyberThrone

Trend Micro Apex One Critical Vulnerabilities

Advertisements

Overview

In early August 2025, Trend Micro issued an urgent security bulletin disclosing two actively exploited critical vulnerabilities in its Apex One and Apex One as a Service (on-prem) endpoint protection platforms. These vulnerabilities could allow unauthenticated remote code execution (RCE) via the Management Console, posing significant security and operational risk to enterprise environments using the on-premise version of Apex One.

Vulnerability Details

1. CVE-2025-54948

2. CVE-2025-54987

Root Cause and Attack Vector

These vulnerabilities stem from insufficient input sanitization in the Remote Install Agent interface of the Apex One Management Console. Specifically:

Affected Versions

Affected Versions Apex One (on-premise) 2019 versions, including builds ≤ 14.0.39Apex One as a Service On-premise service components only (not cloud-managed)

Trend Micro SaaS-managed customers are not impacted, as the cloud console has architectural safeguards in place.

Exploitation in the Wild

Mitigation and Fix Status

Temporary Fix – FixTool_Aug2025

Full Patch Release

Additional Recommendations

  1. Restrict Network Access
    • Limit console access to trusted IP ranges or internal subnets
    • Disable external console exposure immediately if present.
  2. Network Segmentation
    • Isolate management servers from general user networks.
    • Block unnecessary inbound traffic using firewall rules.
  3. Monitor for IOCs
    • Look for signs of command injection, unusual traffic to the management console, or use of admin credentials outside expected hours.
    • Integrate with EDR/XDR platforms for deeper telemetry.
  4. Patch Management
    • Ensure Apex One is updated immediately upon patch release
    • Maintain full patch visibility across hybrid or offline deployments
Exit mobile version