Critical Trend Micro Apex One Vulnerabilities Allow Remote Malicious Code Execution


Trend Micro has disclosed eight security vulnerabilities in its Apex One endpoint protection platform, including two critical-severity flaws that allow unauthenticated remote attackers to upload malicious code and execute commands on affected systems.

The company released a Critical Patch on February 24, 2026, under Solution ID KA-0022458, covering Apex One 2019 (on-premises) on Windows and macOS platforms.

Trend Micro Apex One Vulnerabilities

Trend Micro’s February 2026 security bulletin identifies eight CVEs, CVE-2025-71210 through CVE-2025-71217, with CVSS 3.1 scores ranging from 7.2 to 9.8.

The two most severe flaws, rated Critical (CVSS 9.8), reside in the Apex One management console and exploit directory traversal weaknesses to allow remote code execution without authentication.

The remaining six vulnerabilities are rated High (CVSS 7.2–7.8) and enable local privilege escalation on both Windows and macOS systems.

CVE IDTitleCVSSWeaknessPlatformImpact
CVE-2025-71210Console Directory Traversal RCE9.8CWE-22WindowsRemote code execution via malicious upload
CVE-2025-71211Console Directory Traversal RCE9.8CWE-22WindowsRemote code execution; affects different executable than CVE-2025-71210
CVE-2025-71212Scan Engine Link Following LPE7.8CWE-59WindowsLocal privilege escalation via scan engine
CVE-2025-71213Origin Validation Error LPE7.8CWE-346WindowsLocal privilege escalation via origin validation flaw
CVE-2025-71214Agent iCore Service Origin Validation LPE7.2CWE-346macOSLocal privilege escalation in iCore service
CVE-2025-71215Agent iCore TOCTOU Signature Verification LPE7.8CWE-367macOSLocal privilege escalation via time-of-check/time-of-use race condition
CVE-2025-71216Agent Cache Mechanism TOCTOU LPE7.8CWE-367macOSLocal privilege escalation via cache mechanism race condition
CVE-2025-71217Agent Self-Protection Origin Validation LPE7.8CWE-346macOSLocal privilege escalation in self-protection module

CVE-2025-71210 and CVE-2025-71211 are the most dangerous flaws in this bulletin.

Both exploit improper handling of directory traversal sequences in the Apex One management console, enabling a remote, non-authenticated attacker to send a specially crafted HTTP request to upload and execute arbitrary code.

While the CVEs differ in the specific executable they target, both carry identical attack vectors: network-accessible, no authentication required, no user interaction needed.

The four Windows local privilege escalation flaws, CVE-2025-71212 and CVE-2025-71213, require low-privileged code execution access before exploitation.

The four macOS vulnerabilities (CVE-2025-71214 through CVE-2025-71217) are listed as informational only, as they were already patched via ActiveUpdate and SaaS releases in mid-to-late 2025.​

Affected Products & Fixes

ProductAffected VersionPlatformFix
Apex One2019 (On-premises)WindowsCP Build 14136
Apex One as a ServiceSaaSWindowsSecurity Agent Build 14.0.20315
Trend Vision One Endpoint – Standard Endpoint ProtectionSaaSWindowsSecurity Agent Build 14.0.20315
Apex One (Mac)All versionsmacOSAlready mitigated via SaaS 2507 & 2005 Yearly Release

Mitigation Steps

  • Apply CP Build 14136 for Apex One 2019 (on-premises) immediately from Trend Micro’s Download Center​
  • Upgrade Apex One as a Service agents to Security Agent Build 14.0.20315​
  • Restrict external IP access to the Apex One management console to minimize exposure for CVE-2025-71210 and CVE-2025-71211​
  • Enforce source IP restrictions on the management console if it is externally accessible​
  • Review all remote access policies to critical security infrastructure and ensure perimeter security is current​

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link