Trend Micro Apex Central Vulnerabilities Enables Remote Code Execution Attacks

Trend Micro Apex Central Vulnerabilities Enables Remote Code Execution Attacks

Critical security patches to address three severe vulnerabilities affecting Apex Central (on-premise) that could allow remote attackers to execute malicious code or launch denial-of-service attacks on vulnerable systems.

Trend Micro issued the patches on January 7, 2026, urging all affected customers to update immediately.

The most severe vulnerability, CVE-2025-69258, carries a CVSS score of 9.8 and involves a LoadLibraryEX flaw. This vulnerability enables unauthenticated remote attackers to load malicious DLL files into critical executables.

CVE ID Vulnerability Type CVSS Description
CVE-2025-69258 LoadLibraryEX RCE 9.8 Attackers can load malicious DLLs to execute code as SYSTEM
CVE-2025-69259 NULL Return DoS 7.5 Improper message handling can trigger denial-of-service remotely
CVE-2025-69260 Out-of-bounds Read DoS 7.5 Out-of-bounds reads can cause remote denial-of-service

Potentially allowing code execution with SYSTEM privileges without user interaction. The other two vulnerabilities, CVE-2025-69259 and CVE-2025-69260, both carry CVSS scores of 7.5 and relate to improper message handling.

These flaws could permit remote attackers to trigger denial-of-service conditions on affected systems.

Notably, neither vulnerability requires authentication to exploit, making them particularly dangerous in exposed environments.

google

The vulnerabilities impact Trend Micro Apex Central (on-premise) versions below Build 7190 running on Windows platforms.

Organizations using earlier versions face significant risk from unauthenticated remote attacks that could compromise system integrity and availability.

Trend Micro has released Critical Patch Build 7190 to resolve all three vulnerabilities. The patch is now available through Trend Micro’s Download Center, along with comprehensive release notes to guide deployment.

The company strongly recommends customers prioritize installing this critical patch as soon as possible.

While patches are essential, Trend Micro advises organizations to review remote access policies for critical systems and ensure perimeter security measures remain up to date.

Additional protective measures include restricting network access to Apex Central instances and implementing strict authentication controls.

Trend Micro acknowledged security researchers at Tenable for responsibly disclosing these vulnerabilities, enabling swift remediation efforts that protect the broader customer base from exploitation.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link