{"id":43993,"date":"2026-02-27T02:38:13","date_gmt":"2026-02-26T18:38:13","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/27\/trend-micro-warns-of-critical-apex-one-code-execution-flaws\/"},"modified":"2026-02-27T02:38:13","modified_gmt":"2026-02-26T18:38:13","slug":"trend-micro-warns-of-critical-apex-one-code-execution-flaws","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/27\/trend-micro-warns-of-critical-apex-one-code-execution-flaws\/","title":{"rendered":"Trend Micro warns of critical Apex One code execution flaws"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/01\/09\/Trend_Micro.jpg\" width=\"1600\" alt=\"Trend Micro warns of critical Apex One code execution flaws\"><\/p>\n<p>Japanese cybersecurity software firm Trend Micro has patched two critical Apex One vulnerabilities&nbsp;that allow attackers to gain remote code execution (RCE) on vulnerable&nbsp;Windows systems.<\/p>\n<p>Apex One is an endpoint security platform that detects and responds to security threats, including malware, spyware, malicious tools, and vulnerabilities.<\/p>\n<p>The first critical Apex One security flaw patched this week (CVE-2025-71210) is due to a path traversal weakness in the Trend Micro Apex One management console, allowing attackers without privileges to execute malicious code on unpatched systems.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.wiz.io\/lp\/ai-security-board-report-template?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q4_INB_FORM_AI-Security-Board-Report-Template&amp;sfcid=701Vh00000Wn7E1IAJ&amp;utm_term=FY27-bleepingcomputer-article-970x250&amp;utm_content=AI-Board-Report\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/w\/ai-security-board-report-template.jpg\" style=\"margin-top: 0px;\" alt=\"Trend Micro warns of critical Apex One code execution flaws\"><\/a> <\/div>\n<p>The second, tracked as CVE-2025-71211, is another Apex One management console path traversal vulnerability, similar in scope to CVE-2025-71210 but affecting a different executable.<\/p>\n<p>As Trend Micro explained in a <a href=\"https:\/\/success.trendmicro.com\/en-US\/solution\/KA-0022458\" target=\"_blank\" rel=\"nofollow noopener\">Tuesday security advisory<\/a>, successful exploitation requires attackers to &#8220;have access to the Trend Micro Apex One Management Console, so customers that have their console&#8217;s IP address exposed externally should consider mitigating factors such as source restrictions if not already applied.&#8221;<\/p>\n<p>&#8220;Even though an exploit may require several specific conditions to be met, Trend Micro strongly encourages customers to update to the latest builds as soon as possible,&#8221; it warned.<\/p>\n<p>To address these critical security flaws, Trend Micro has patched the vulnerabilities in the SaaS Apex One versions and released Critical Patch Build 14136, which also fixes two high-severity privilege escalation flaws in the Windows agent and four more affecting the macOS agent.<\/p>\n<p>While Trend Micro has not flagged these vulnerabilities as exploited in the wild, threat actors have abused other Apex One in attacks over the last several years.<\/p>\n<p>For instance, Trend Micro warned customers to patch an actively exploited Apex One RCE vulnerability (CVE-2025-54948) <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/trend-micro-warns-of-endpoint-protection-zero-day-exploited-in-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">in August 2025<\/a>, and addressed two other Apex One zero-days exploited in the wild in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/trend-micro-warns-of-actively-exploited-apex-one-rce-vulnerability\/\" target=\"_blank\" rel=\"nofollow noopener\">September 2022<\/a> (CVE-2022-40139) and in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/trend-micro-fixes-endpoint-protection-zero-day-used-in-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">September 2023<\/a> (CVE-2023-41179).<\/p>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) currently <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?search_api_fulltext=%22trend+micro+apex%22\" target=\"_blank\" rel=\"nofollow noopener\">tracks 10 Trend Micro Apex vulnerabilities<\/a>&nbsp;that have either been or are still being exploited in the wild.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/t\/tines-in-art-square.jpg\" alt=\"Trend Micro warns of critical Apex One code execution flaws\">         <\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">The future of IT infrastructure is here<\/a><\/h2>\n<p>Modern IT infrastructure moves faster than manual workflows can handle.<\/p>\n<p>In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.<\/p>\n<p>          <button><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">Get the guide<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/trend-micro-fixes-critical-rce-flaw-in-apex-central-console\/\">Trend Micro warns of critical Apex Central RCE vulnerability<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/trend-micro-fixes-actively-exploited-remote-code-execution-bug\/\">Trend Micro fixes actively exploited remote code execution bug<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-juniper-networks-ptx-flaw-allows-full-router-takeover\/\">Critical Juniper Networks PTX flaw allows full router takeover<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-beyondtrust-rce-flaw-now-exploited-in-ransomware-attacks\/\">CISA: BeyondTrust RCE flaw now exploited in ransomware attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/one-threat-actor-responsible-for-83-percent-of-recent-ivanti-rce-attacks\/\">One threat actor responsible for 83% of recent Ivanti RCE attacks<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Japanese cybersecurity software firm Trend Micro has pa [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-43993","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43993"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43993\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}