Action not permitted
Modal body text goes here.
Modal Title
Modal Body
jvndb-2025-009150
Vulnerability from jvndb
Published
2025-07-17 17:03
Modified
2025-07-17 17:03
Summary
Security updates for Trend Micro products (June 2025)
Details
Trend Micro Incorporated has released security updates for multiple Trend Micro products.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of its solution through JVN.
References
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-009150.html", "dc:date": "2025-07-17T17:03+09:00", "dcterms:issued": "2025-07-17T17:03+09:00", "dcterms:modified": "2025-07-17T17:03+09:00", "description": "Trend Micro Incorporated has released security updates for multiple Trend Micro products.\r\n\r\nTrend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of its solution through JVN.", "link": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-009150.html", "sec:cpe": [ { "#text": "cpe:/a:trendmicro:apex_central", "@product": "Apex Central", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:apex_one", "@product": "Apex One", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:apex_one_as_a_service", "@product": "Apex One as a Service", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:business_security", "@product": "Worry-Free Business Security", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:business_security_services", "@product": "Worry-Free Business Security Services", "@vendor": "Trend Micro, Inc.", "@version": "2.2" } ], "sec:identifier": "JVNDB-2025-009150", "sec:references": [ { "#text": "https://jvn.jp/en/vu/JVNVU96526886/", "@id": "JVNVU#96526886", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-49154", "@id": "CVE-2025-49154", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-49155", "@id": "CVE-2025-49155", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-49156", "@id": "CVE-2025-49156", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-49157", "@id": "CVE-2025-49157", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-49158", "@id": "CVE-2025-49158", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-49219", "@id": "CVE-2025-49219", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-49220", "@id": "CVE-2025-49220", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-49487", "@id": "CVE-2025-49487", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-53378", "@id": "CVE-2025-53378", "@source": "CVE" } ], "title": "Security updates for Trend Micro products (June 2025)" }
CVE-2025-49156 (GCVE-0-2025-49156)
Vulnerability from cvelistv5
Published
2025-06-17 18:42
Modified
2025-06-17 20:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-269 - Improper Privilege Management
Summary
A link following vulnerability in the Trend Micro Apex One scan engine could allow a local attacker to escalation privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 (14.0) ≤ cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:* |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49156", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T20:21:14.126992Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:21:26.155Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:*" ], "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.14002", "status": "affected", "version": "2019 (14.0)", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:trendmicro:apexone_saas:14.0.0.14492:ga:*:*:*:*:*:*" ], "product": "Trend Micro Apex One as a Service", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.14492", "status": "affected", "version": "SaaS", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A link following vulnerability in the Trend Micro Apex One scan engine could allow a local attacker to escalation privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T18:42:39.613Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019917" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-363/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49156", "datePublished": "2025-06-17T18:42:39.613Z", "dateReserved": "2025-06-02T17:43:08.724Z", "dateUpdated": "2025-06-17T20:21:26.155Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49157 (GCVE-0-2025-49157)
Vulnerability from cvelistv5
Published
2025-06-17 18:42
Modified
2025-06-17 20:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-269 - Improper Privilege Management
Summary
A link following vulnerability in the Trend Micro Apex One Damage Cleanup Engine could allow a local attacker to escalation privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 (14.0) ≤ cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:* |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49157", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T20:18:11.067392Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:18:26.406Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:*" ], "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.14002", "status": "affected", "version": "2019 (14.0)", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:trendmicro:apexone_saas:14.0.0.14492:ga:*:*:*:*:*:*" ], "product": "Trend Micro Apex One as a Service", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.14492", "status": "affected", "version": "SaaS", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A link following vulnerability in the Trend Micro Apex One Damage Cleanup Engine could allow a local attacker to escalation privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T18:42:49.084Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019917" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-364/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49157", "datePublished": "2025-06-17T18:42:49.084Z", "dateReserved": "2025-06-02T17:43:08.724Z", "dateUpdated": "2025-06-17T20:18:26.406Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49154 (GCVE-0-2025-49154)
Vulnerability from cvelistv5
Published
2025-06-17 18:42
Modified
2025-06-17 20:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Control
Summary
An insecure access control vulnerability in Trend Micro Apex One and Trend Micro Worry-Free Business Security could allow a local attacker to overwrite key memory-mapped files which could then have severe consequences for the security and stability of affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 (14.0) ≤ cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:* |
|||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49154", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T20:23:50.312099Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:25:33.603Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:*" ], "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.14002", "status": "affected", "version": "2019 (14.0)", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:trendmicro:apexone_saas:14.0.0.14492:ga:*:*:*:*:*:*" ], "product": "Trend Micro Apex One as a Service", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.14492", "status": "affected", "version": "SaaS", "versionType": "semver" } ] }, { "product": "Worry-Free Business Security", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "2514", "status": "affected", "version": "10.0 SP1", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An insecure access control vulnerability in Trend Micro Apex One and Trend Micro Worry-Free Business Security could allow a local attacker to overwrite key memory-mapped files which could then have severe consequences for the security and stability of affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T18:42:10.085Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019917" }, { "url": "https://success.trendmicro.com/en-US/solution/KA-0019936" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49154", "datePublished": "2025-06-17T18:42:10.085Z", "dateReserved": "2025-06-02T17:43:08.723Z", "dateUpdated": "2025-06-17T20:25:33.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49155 (GCVE-0-2025-49155)
Vulnerability from cvelistv5
Published
2025-06-17 18:42
Modified
2025-06-17 20:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-427 - Uncontrolled Search Path Element
Summary
An uncontrolled search path vulnerability in the Trend Micro Apex One Data Loss Prevention module could allow an attacker to inject malicious code leading to arbitrary code execution on affected installations.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 (14.0) ≤ cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:* |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49155", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T20:22:23.426414Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:22:40.129Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:*" ], "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.14002", "status": "affected", "version": "2019 (14.0)", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:trendmicro:apexone_saas:14.0.0.14492:ga:*:*:*:*:*:*" ], "product": "Trend Micro Apex One as a Service", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.14492", "status": "affected", "version": "SaaS", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An uncontrolled search path vulnerability in the Trend Micro Apex One Data Loss Prevention module could allow an attacker to inject malicious code leading to arbitrary code execution on affected installations." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427: Uncontrolled Search Path Element", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T18:42:31.517Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019917" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-362/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49155", "datePublished": "2025-06-17T18:42:31.517Z", "dateReserved": "2025-06-02T17:43:08.724Z", "dateUpdated": "2025-06-17T20:22:40.129Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49220 (GCVE-0-2025-49220)
Vulnerability from cvelistv5
Published
2025-06-17 17:43
Modified
2025-06-18 03:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-477 - Use of Obsolete Function
Summary
An insecure deserialization operation in Trend Micro Apex Central below version 8.0.7007 could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49219 but is in a different method.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Apex Central |
Version: 8.0 ≤ cpe:2.3:a:trendmicro:apex_central:7007:*:*:en:*:windows_10:x86_64:1809 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49220", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-18T03:56:05.373Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:apex_central:7007:*:*:en:*:windows_10:x86_64:1809" ], "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.7007", "status": "affected", "version": "8.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An insecure deserialization operation in Trend Micro Apex Central below version 8.0.7007 could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49219 but is in a different method." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-477", "description": "CWE-477: Use of Obsolete Function", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T17:43:23.501Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019926" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-367/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49220", "datePublished": "2025-06-17T17:43:23.501Z", "dateReserved": "2025-06-03T18:11:27.260Z", "dateUpdated": "2025-06-18T03:56:05.373Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49219 (GCVE-0-2025-49219)
Vulnerability from cvelistv5
Published
2025-06-17 17:43
Modified
2025-06-18 03:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-477 - Use of Obsolete Function
Summary
An insecure deserialization operation in Trend Micro Apex Central below versions 8.0.7007 could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49220 but is in a different method.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Apex Central |
Version: 8.0 ≤ cpe:2.3:a:trendmicro:apex_central:7007:*:*:en:*:windows_10:x86_64:1809 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49219", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-18T03:56:06.490Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:apex_central:7007:*:*:en:*:windows_10:x86_64:1809" ], "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.7007", "status": "affected", "version": "8.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An insecure deserialization operation in Trend Micro Apex Central below versions 8.0.7007 could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49220 but is in a different method." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-477", "description": "CWE-477: Use of Obsolete Function", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T17:43:12.062Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019926" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-366/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49219", "datePublished": "2025-06-17T17:43:12.062Z", "dateReserved": "2025-06-03T18:11:27.260Z", "dateUpdated": "2025-06-18T03:56:06.490Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-53378 (GCVE-0-2025-53378)
Vulnerability from cvelistv5
Published
2025-07-10 18:58
Modified
2025-07-10 19:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-306 - Missing Authentication for Critical Function
Summary
A missing authentication vulnerability in Trend Micro Worry-Free Business Security Services (WFBSS) agent could have allowed an unauthenticated attacker to remotely take control of the agent on affected installations.
Also note: this vulnerability only affected the SaaS client version of WFBSS only, meaning the on-premise version of Worry-Free Business Security was not affected, and this issue was addressed in a WFBSS monthly maintenance update. Therefore no other customer action is required to mitigate if the WFBSS agents are on the regular SaaS maintenance deployment schedule and this disclosure is for informational purposes only.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Worry-Free Business Security Services |
Version: SaaS ≤ cpe:2.3:a:trendmicro:wfbs_saas:20240325:ga:*:*:*:*:*:* |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53378", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-10T19:05:55.500442Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-10T19:06:00.457Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:wfbs_saas:20240325:ga:*:*:*:*:*:*" ], "product": "Trend Micro Worry-Free Business Security Services", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "6.7.3954 / 14.3.1299", "status": "affected", "version": "SaaS", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A missing authentication vulnerability in Trend Micro Worry-Free Business Security Services (WFBSS) agent could have allowed an unauthenticated attacker to remotely take control of the agent on affected installations.\r\n\r\nAlso note: this vulnerability only affected the SaaS client version of WFBSS only, meaning the on-premise version of Worry-Free Business Security was not affected, and this issue was addressed in a WFBSS monthly maintenance update. Therefore no other customer action is required to mitigate if the WFBSS agents are on the regular SaaS maintenance deployment schedule and this disclosure is for informational purposes only." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-10T18:58:55.645Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019936" } ], "tags": [ "exclusively-hosted-service" ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-53378", "datePublished": "2025-07-10T18:58:55.645Z", "dateReserved": "2025-06-27T14:39:20.760Z", "dateUpdated": "2025-07-10T19:06:00.457Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49487 (GCVE-0-2025-49487)
Vulnerability from cvelistv5
Published
2025-06-17 18:43
Modified
2025-06-17 19:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-427 - Uncontrolled Search Path Element
Summary
An uncontrolled search path vulnerability in the Trend Micro Worry-Free Business Security Services (WFBSS) agent could have allowed an attacker with physical access to a machine to execute arbitrary code on affected installations.
An attacker must have had physical access to the target system in order to exploit this vulnerability due to need to access a certain hardware component.
Also note: this vulnerability only affected the SaaS client version of WFBSS only, meaning the on-premise version of Worry-Free Business Security was not affected, and this issue was addressed in a previous WFBSS monthly maintenance update. Therefore no other customer action is required to mitigate if the WFBSS agents are on the regular SaaS maintenance deployment schedule and this disclosure is for informational purposes only.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Worry-Free Business Security Services |
Version: SaaS ≤ cpe:2.3:a:trendmicro:wfbs_saas:20240325:ga:*:*:*:*:*:* |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49487", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T19:52:26.648133Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T19:52:40.992Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:wfbs_saas:20240325:ga:*:*:*:*:*:*" ], "product": "Trend Micro Worry-Free Business Security Services", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "6.7.3954 / 14.3.1299", "status": "affected", "version": "SaaS", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An uncontrolled search path vulnerability in the Trend Micro Worry-Free Business Security Services (WFBSS) agent could have allowed an attacker with physical access to a machine to execute arbitrary code on affected installations.\r\n\r\nAn attacker must have had physical access to the target system in order to exploit this vulnerability due to need to access a certain hardware component.\r\n\r\nAlso note: this vulnerability only affected the SaaS client version of WFBSS only, meaning the on-premise version of Worry-Free Business Security was not affected, and this issue was addressed in a previous WFBSS monthly maintenance update. Therefore no other customer action is required to mitigate if the WFBSS agents are on the regular SaaS maintenance deployment schedule and this disclosure is for informational purposes only." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427: Uncontrolled Search Path Element", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T18:43:11.176Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019936" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-360/" } ], "tags": [ "exclusively-hosted-service" ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49487", "datePublished": "2025-06-17T18:43:11.176Z", "dateReserved": "2025-06-05T14:08:10.764Z", "dateUpdated": "2025-06-17T19:52:40.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49158 (GCVE-0-2025-49158)
Vulnerability from cvelistv5
Published
2025-06-17 18:42
Modified
2025-06-17 19:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-427 - Uncontrolled Search Path Element
Summary
An uncontrolled search path vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalation privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 (14.0) ≤ cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:* |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49158", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T19:55:27.119354Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T19:55:43.823Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:*" ], "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.14002", "status": "affected", "version": "2019 (14.0)", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:trendmicro:apexone_saas:14.0.0.14492:ga:*:*:*:*:*:*" ], "product": "Trend Micro Apex One as a Service", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.14492", "status": "affected", "version": "SaaS", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An uncontrolled search path vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalation privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427: Uncontrolled Search Path Element", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T18:42:56.705Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019917" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-365/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49158", "datePublished": "2025-06-17T18:42:56.705Z", "dateReserved": "2025-06-02T17:43:08.724Z", "dateUpdated": "2025-06-17T19:55:43.823Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…