
"The critical flaws both impact the Trend Micro Apex One management console and could allow a remote attacker to upload malicious code and execute commands on affected installations. These security holes, tracked as CVE-2025-71210 and CVE-2025-71211, are similar in scope, but they impact different executables."
"The remaining vulnerabilities - all assigned a high severity rating - can be exploited by an attacker who already has access to the targeted system to escalate privileges. The high-severity issues have been assigned the CVE identifiers CVE-2025-71212 through CVE-2025-71217."
"Exploiting these type of vulnerabilities generally require that an attacker has access (physical or remote) to a vulnerable machine. In addition to timely application of patches and updated solutions, customers are also advised to review remote access to critical systems and ensure policies and perimeter security is up-to-date."
TrendAI announced patches addressing eight vulnerabilities in Windows and macOS versions of Apex One endpoint security solution. Two critical vulnerabilities (CVE-2025-71210 and CVE-2025-71211) affect the management console and enable remote attackers to upload malicious code and execute commands. Six high-severity vulnerabilities (CVE-2025-71212 through CVE-2025-71217) require prior system access for privilege escalation exploitation. All vulnerabilities were reported through the Zero Day Initiative. Patches are available for on-premises versions; SaaS users require no action. TrendAI reports no current in-the-wild exploitation, though Apex products have historically been targeted by threat actors.
Read at SecurityWeek
Unable to calculate read time
Collection
[
|
...
]