Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2025-AVI-0544
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Trend Micro. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une injection SQL (SQLi).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
Vendor | Product | Description | ||
---|---|---|---|---|
Trend Micro | Worry-Free Business Security | Worry-Free Business Security Services versions antérieures à 6.7.3954 et 14.3.1299 | ||
Trend Micro | Apex One | Security agent pour Apex One as a Service versions antérieures à 14.0.14492 | ||
Trend Micro | Apex Central | Apex Central versions antérieures à CP B7007 | ||
Trend Micro | Apex Central | Apex Central as a Service sans le correctif de sécurité d'Avril 2025 | ||
Trend Micro | Apex One | Apex One versions antérieures à SP1 CP Build 14002 | ||
Trend Micro | Trend Micro Endpoint Encryption | Trend Micro Endpoint Encryption PolicyServer sans correctif de sécurité Patch 1 Update 6 (Version 6.0.0.4013) | ||
Trend Micro | Worry-Free Business Security | Worry-Free Business Security versions antérieures à 10 SP1 Patch 2514 |
References
Title | Publication Time | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Worry-Free Business Security Services versions ant\u00e9rieures \u00e0 6.7.3954 et 14.3.1299", "product": { "name": "Worry-Free Business Security", "vendor": { "name": "Trend Micro", "scada": false } } }, { "description": "Security agent pour Apex One as a Service versions ant\u00e9rieures \u00e0 14.0.14492", "product": { "name": "Apex One", "vendor": { "name": "Trend Micro", "scada": false } } }, { "description": "Apex Central versions ant\u00e9rieures \u00e0 CP B7007", "product": { "name": "Apex Central", "vendor": { "name": "Trend Micro", "scada": false } } }, { "description": "Apex Central as a Service sans le correctif de s\u00e9curit\u00e9 d\u0027Avril 2025", "product": { "name": "Apex Central", "vendor": { "name": "Trend Micro", "scada": false } } }, { "description": "Apex One versions ant\u00e9rieures \u00e0 SP1 CP Build 14002", "product": { "name": "Apex One", "vendor": { "name": "Trend Micro", "scada": false } } }, { "description": "Trend Micro Endpoint Encryption PolicyServer sans correctif de s\u00e9curit\u00e9 Patch 1 Update 6 (Version 6.0.0.4013)", "product": { "name": "Trend Micro Endpoint Encryption", "vendor": { "name": "Trend Micro", "scada": false } } }, { "description": "Worry-Free Business Security versions ant\u00e9rieures \u00e0 10 SP1 Patch 2514", "product": { "name": "Worry-Free Business Security", "vendor": { "name": "Trend Micro", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-49220", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49220" }, { "name": "CVE-2025-49219", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49219" }, { "name": "CVE-2025-49156", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49156" }, { "name": "CVE-2025-49155", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49155" }, { "name": "CVE-2025-49215", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49215" }, { "name": "CVE-2025-49214", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49214" }, { "name": "CVE-2025-49212", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49212" }, { "name": "CVE-2025-49157", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49157" }, { "name": "CVE-2025-49487", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49487" }, { "name": "CVE-2025-49216", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49216" }, { "name": "CVE-2025-49217", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49217" }, { "name": "CVE-2025-49213", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49213" }, { "name": "CVE-2025-49158", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49158" }, { "name": "CVE-2025-49211", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49211" }, { "name": "CVE-2025-49154", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49154" }, { "name": "CVE-2025-49218", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49218" } ], "initial_release_date": "2025-06-27T00:00:00", "last_revision_date": "2025-06-27T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0544", "revisions": [ { "description": "Version initiale", "revision_date": "2025-06-27T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Injection SQL (SQLi)" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Trend Micro. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une injection SQL (SQLi).", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Trend Micro", "vendor_advisories": [ { "published_at": "2025-06-09", "title": "Bulletin de s\u00e9curit\u00e9 Trend Micro KA-0019936", "url": "https://success.trendmicro.com/en-US/solution/KA-0019936" }, { "published_at": "2025-06-10", "title": "Bulletin de s\u00e9curit\u00e9 Trend Micro KA-0019926", "url": "https://success.trendmicro.com/en-US/solution/KA-0019926" }, { "published_at": "2025-06-10", "title": "Bulletin de s\u00e9curit\u00e9 Trend Micro KA-0019928", "url": "https://success.trendmicro.com/en-US/solution/KA-0019928" }, { "published_at": "2025-06-09", "title": "Bulletin de s\u00e9curit\u00e9 Trend Micro KA-0019917", "url": "https://success.trendmicro.com/en-US/solution/KA-0019917" } ] }
CVE-2025-49158 (GCVE-0-2025-49158)
Vulnerability from cvelistv5
Published
2025-06-17 18:42
Modified
2025-06-17 19:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-427 - Uncontrolled Search Path Element
Summary
An uncontrolled search path vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalation privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 (14.0) ≤ cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:* |
|||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49158", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T19:55:27.119354Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T19:55:43.823Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:*" ], "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.14002", "status": "affected", "version": "2019 (14.0)", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:trendmicro:apexone_saas:14.0.0.14492:ga:*:*:*:*:*:*" ], "product": "Trend Micro Apex One as a Service", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.14492", "status": "affected", "version": "SaaS", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An uncontrolled search path vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalation privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427: Uncontrolled Search Path Element", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T18:42:56.705Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019917" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-365/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49158", "datePublished": "2025-06-17T18:42:56.705Z", "dateReserved": "2025-06-02T17:43:08.724Z", "dateUpdated": "2025-06-17T19:55:43.823Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49154 (GCVE-0-2025-49154)
Vulnerability from cvelistv5
Published
2025-06-17 18:42
Modified
2025-06-17 20:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Control
Summary
An insecure access control vulnerability in Trend Micro Apex One and Trend Micro Worry-Free Business Security could allow a local attacker to overwrite key memory-mapped files which could then have severe consequences for the security and stability of affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 (14.0) ≤ cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:* |
||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49154", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T20:23:50.312099Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:25:33.603Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:*" ], "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.14002", "status": "affected", "version": "2019 (14.0)", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:trendmicro:apexone_saas:14.0.0.14492:ga:*:*:*:*:*:*" ], "product": "Trend Micro Apex One as a Service", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.14492", "status": "affected", "version": "SaaS", "versionType": "semver" } ] }, { "product": "Worry-Free Business Security", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "2514", "status": "affected", "version": "10.0 SP1", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An insecure access control vulnerability in Trend Micro Apex One and Trend Micro Worry-Free Business Security could allow a local attacker to overwrite key memory-mapped files which could then have severe consequences for the security and stability of affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T18:42:10.085Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019917" }, { "url": "https://success.trendmicro.com/en-US/solution/KA-0019936" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49154", "datePublished": "2025-06-17T18:42:10.085Z", "dateReserved": "2025-06-02T17:43:08.723Z", "dateUpdated": "2025-06-17T20:25:33.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49220 (GCVE-0-2025-49220)
Vulnerability from cvelistv5
Published
2025-06-17 17:43
Modified
2025-06-18 03:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-477 - Use of Obsolete Function
Summary
An insecure deserialization operation in Trend Micro Apex Central below version 8.0.7007 could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49219 but is in a different method.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Apex Central |
Version: 8.0 ≤ cpe:2.3:a:trendmicro:apex_central:7007:*:*:en:*:windows_10:x86_64:1809 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49220", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-18T03:56:05.373Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:apex_central:7007:*:*:en:*:windows_10:x86_64:1809" ], "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.7007", "status": "affected", "version": "8.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An insecure deserialization operation in Trend Micro Apex Central below version 8.0.7007 could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49219 but is in a different method." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-477", "description": "CWE-477: Use of Obsolete Function", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T17:43:23.501Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019926" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-367/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49220", "datePublished": "2025-06-17T17:43:23.501Z", "dateReserved": "2025-06-03T18:11:27.260Z", "dateUpdated": "2025-06-18T03:56:05.373Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49156 (GCVE-0-2025-49156)
Vulnerability from cvelistv5
Published
2025-06-17 18:42
Modified
2025-06-17 20:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-269 - Improper Privilege Management
Summary
A link following vulnerability in the Trend Micro Apex One scan engine could allow a local attacker to escalation privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 (14.0) ≤ cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:* |
|||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49156", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T20:21:14.126992Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:21:26.155Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:*" ], "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.14002", "status": "affected", "version": "2019 (14.0)", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:trendmicro:apexone_saas:14.0.0.14492:ga:*:*:*:*:*:*" ], "product": "Trend Micro Apex One as a Service", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.14492", "status": "affected", "version": "SaaS", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A link following vulnerability in the Trend Micro Apex One scan engine could allow a local attacker to escalation privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T18:42:39.613Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019917" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-363/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49156", "datePublished": "2025-06-17T18:42:39.613Z", "dateReserved": "2025-06-02T17:43:08.724Z", "dateUpdated": "2025-06-17T20:21:26.155Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49487 (GCVE-0-2025-49487)
Vulnerability from cvelistv5
Published
2025-06-17 18:43
Modified
2025-06-17 19:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-427 - Uncontrolled Search Path Element
Summary
An uncontrolled search path vulnerability in the Trend Micro Worry-Free Business Security Services (WFBSS) agent could have allowed an attacker with physical access to a machine to execute arbitrary code on affected installations.
An attacker must have had physical access to the target system in order to exploit this vulnerability due to need to access a certain hardware component.
Also note: this vulnerability only affected the SaaS client version of WFBSS only, meaning the on-premise version of Worry-Free Business Security was not affected, and this issue was addressed in a previous WFBSS monthly maintenance update. Therefore no other customer action is required to mitigate if the WFBSS agents are on the regular SaaS maintenance deployment schedule and this disclosure is for informational purposes only.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Worry-Free Business Security Services |
Version: SaaS ≤ cpe:2.3:a:trendmicro:wfbs_saas:20240325:ga:*:*:*:*:*:* |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49487", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T19:52:26.648133Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T19:52:40.992Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:wfbs_saas:20240325:ga:*:*:*:*:*:*" ], "product": "Trend Micro Worry-Free Business Security Services", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "6.7.3954 / 14.3.1299", "status": "affected", "version": "SaaS", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An uncontrolled search path vulnerability in the Trend Micro Worry-Free Business Security Services (WFBSS) agent could have allowed an attacker with physical access to a machine to execute arbitrary code on affected installations.\r\n\r\nAn attacker must have had physical access to the target system in order to exploit this vulnerability due to need to access a certain hardware component.\r\n\r\nAlso note: this vulnerability only affected the SaaS client version of WFBSS only, meaning the on-premise version of Worry-Free Business Security was not affected, and this issue was addressed in a previous WFBSS monthly maintenance update. Therefore no other customer action is required to mitigate if the WFBSS agents are on the regular SaaS maintenance deployment schedule and this disclosure is for informational purposes only." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427: Uncontrolled Search Path Element", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T18:43:11.176Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019936" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-360/" } ], "tags": [ "exclusively-hosted-service" ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49487", "datePublished": "2025-06-17T18:43:11.176Z", "dateReserved": "2025-06-05T14:08:10.764Z", "dateUpdated": "2025-06-17T19:52:40.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49216 (GCVE-0-2025-49216)
Vulnerability from cvelistv5
Published
2025-06-17 20:28
Modified
2025-06-18 14:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-477 - Use of Obsolete Function
Summary
An authentication bypass vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to access key methods as an admin user and modify product configurations on affected installations.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Endpoint Encryption Policy Server |
Version: 6.0 ≤ cpe:2.3:a:trendmicro:endpoint_encryption_policy_server:6.0.0.4013:p1u6:*:*:*:*:*:* |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49216", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-18T14:04:03.506589Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-18T14:05:54.493Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:endpoint_encryption_policy_server:6.0.0.4013:p1u6:*:*:*:*:*:*" ], "product": "Trend Micro Endpoint Encryption Policy Server", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "6.0.0.4013", "status": "affected", "version": "6.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An authentication bypass vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to access key methods as an admin user and modify product configurations on affected installations." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-477", "description": "CWE-477: Use of Obsolete Function", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:28:07.764Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019928" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-373/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49216", "datePublished": "2025-06-17T20:28:07.764Z", "dateReserved": "2025-06-03T18:11:27.259Z", "dateUpdated": "2025-06-18T14:05:54.493Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49217 (GCVE-0-2025-49217)
Vulnerability from cvelistv5
Published
2025-06-17 20:28
Modified
2025-06-18 15:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-477 - Use of Obsolete Function
Summary
An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49213 but is in a different method.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Endpoint Encryption Policy Server |
Version: 6.0 ≤ cpe:2.3:a:trendmicro:endpoint_encryption_policy_server:6.0.0.4013:p1u6:*:*:*:*:*:* |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49217", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-18T15:51:14.698629Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-18T15:53:47.899Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:endpoint_encryption_policy_server:6.0.0.4013:p1u6:*:*:*:*:*:*" ], "product": "Trend Micro Endpoint Encryption Policy Server", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "6.0.0.4013", "status": "affected", "version": "6.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49213 but is in a different method." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-477", "description": "CWE-477: Use of Obsolete Function", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:28:14.897Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019928" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-374/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49217", "datePublished": "2025-06-17T20:28:14.897Z", "dateReserved": "2025-06-03T18:11:27.260Z", "dateUpdated": "2025-06-18T15:53:47.899Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49213 (GCVE-0-2025-49213)
Vulnerability from cvelistv5
Published
2025-06-17 20:27
Modified
2025-06-18 14:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-477 - Use of Obsolete Function
Summary
An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49212 but is in a different method.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Endpoint Encryption Policy Server |
Version: 6.0 ≤ cpe:2.3:a:trendmicro:endpoint_encryption_policy_server:6.0.0.4013:p1u6:*:*:*:*:*:* |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49213", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-18T14:36:00.638328Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-18T14:42:21.550Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:endpoint_encryption_policy_server:6.0.0.4013:p1u6:*:*:*:*:*:*" ], "product": "Trend Micro Endpoint Encryption Policy Server", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "6.0.0.4013", "status": "affected", "version": "6.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49212 but is in a different method." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-477", "description": "CWE-477: Use of Obsolete Function", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:27:44.731Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019928" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-370/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49213", "datePublished": "2025-06-17T20:27:44.731Z", "dateReserved": "2025-06-03T18:11:27.259Z", "dateUpdated": "2025-06-18T14:42:21.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49211 (GCVE-0-2025-49211)
Vulnerability from cvelistv5
Published
2025-06-17 20:16
Modified
2025-06-20 13:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - SQL Injection
Summary
A SQL injection vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Endpoint Encryption Policy Server |
Version: 6.0 ≤ cpe:2.3:a:trendmicro:endpoint_encryption_policy_server:6.0.0.4013:p1u6:*:*:*:*:*:* |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49211", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-18T14:19:45.495355Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-20T13:12:22.833Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:endpoint_encryption_policy_server:6.0.0.4013:p1u6:*:*:*:*:*:*" ], "product": "Trend Micro Endpoint Encryption Policy Server", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "6.0.0.4013", "status": "affected", "version": "6.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A SQL injection vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to escalate privileges on affected installations. \r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: SQL Injection", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:16:38.307Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019928" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-368/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49211", "datePublished": "2025-06-17T20:16:38.307Z", "dateReserved": "2025-06-03T18:11:27.258Z", "dateUpdated": "2025-06-20T13:12:22.833Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49214 (GCVE-0-2025-49214)
Vulnerability from cvelistv5
Published
2025-06-17 20:27
Modified
2025-06-18 14:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-477 - Use of Obsolete Function
Summary
An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a post-authentication remote code execution on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Endpoint Encryption Policy Server |
Version: 6.0 ≤ cpe:2.3:a:trendmicro:endpoint_encryption_policy_server:6.0.0.4013:p1u6:*:*:*:*:*:* |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49214", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-18T14:11:56.945009Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-18T14:16:36.955Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:endpoint_encryption_policy_server:6.0.0.4013:p1u6:*:*:*:*:*:*" ], "product": "Trend Micro Endpoint Encryption Policy Server", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "6.0.0.4013", "status": "affected", "version": "6.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a post-authentication remote code execution on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-477", "description": "CWE-477: Use of Obsolete Function", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:27:52.986Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019928" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-371/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49214", "datePublished": "2025-06-17T20:27:52.986Z", "dateReserved": "2025-06-03T18:11:27.259Z", "dateUpdated": "2025-06-18T14:16:36.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49157 (GCVE-0-2025-49157)
Vulnerability from cvelistv5
Published
2025-06-17 18:42
Modified
2025-06-17 20:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-269 - Improper Privilege Management
Summary
A link following vulnerability in the Trend Micro Apex One Damage Cleanup Engine could allow a local attacker to escalation privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 (14.0) ≤ cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:* |
|||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49157", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T20:18:11.067392Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:18:26.406Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:*" ], "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.14002", "status": "affected", "version": "2019 (14.0)", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:trendmicro:apexone_saas:14.0.0.14492:ga:*:*:*:*:*:*" ], "product": "Trend Micro Apex One as a Service", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.14492", "status": "affected", "version": "SaaS", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A link following vulnerability in the Trend Micro Apex One Damage Cleanup Engine could allow a local attacker to escalation privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T18:42:49.084Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019917" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-364/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49157", "datePublished": "2025-06-17T18:42:49.084Z", "dateReserved": "2025-06-02T17:43:08.724Z", "dateUpdated": "2025-06-17T20:18:26.406Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49215 (GCVE-0-2025-49215)
Vulnerability from cvelistv5
Published
2025-06-17 20:28
Modified
2025-06-18 14:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-242 - Use of Inherently Dangerous Function
Summary
A post-auth SQL injection vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Endpoint Encryption Policy Server |
Version: 6.0 ≤ cpe:2.3:a:trendmicro:endpoint_encryption_policy_server:6.0.0.4013:p1u6:*:*:*:*:*:* |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49215", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-18T14:11:03.683477Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-18T14:11:36.236Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:endpoint_encryption_policy_server:6.0.0.4013:p1u6:*:*:*:*:*:*" ], "product": "Trend Micro Endpoint Encryption Policy Server", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "6.0.0.4013", "status": "affected", "version": "6.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A post-auth SQL injection vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to escalate privileges on affected installations. \r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-242", "description": "CWE-242: Use of Inherently Dangerous Function", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:28:00.564Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019928" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-372/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49215", "datePublished": "2025-06-17T20:28:00.564Z", "dateReserved": "2025-06-03T18:11:27.259Z", "dateUpdated": "2025-06-18T14:11:36.236Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49155 (GCVE-0-2025-49155)
Vulnerability from cvelistv5
Published
2025-06-17 18:42
Modified
2025-06-17 20:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-427 - Uncontrolled Search Path Element
Summary
An uncontrolled search path vulnerability in the Trend Micro Apex One Data Loss Prevention module could allow an attacker to inject malicious code leading to arbitrary code execution on affected installations.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Apex One |
Version: 2019 (14.0) ≤ cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:* |
|||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49155", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T20:22:23.426414Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:22:40.129Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:*" ], "product": "Trend Micro Apex One", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.0.14002", "status": "affected", "version": "2019 (14.0)", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:trendmicro:apexone_saas:14.0.0.14492:ga:*:*:*:*:*:*" ], "product": "Trend Micro Apex One as a Service", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "14.0.14492", "status": "affected", "version": "SaaS", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An uncontrolled search path vulnerability in the Trend Micro Apex One Data Loss Prevention module could allow an attacker to inject malicious code leading to arbitrary code execution on affected installations." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427: Uncontrolled Search Path Element", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T18:42:31.517Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019917" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-362/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49155", "datePublished": "2025-06-17T18:42:31.517Z", "dateReserved": "2025-06-02T17:43:08.724Z", "dateUpdated": "2025-06-17T20:22:40.129Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49212 (GCVE-0-2025-49212)
Vulnerability from cvelistv5
Published
2025-06-17 20:27
Modified
2025-06-18 14:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-477 - Use of Obsolete Function
Summary
An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49220 but is in a different method.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Endpoint Encryption Policy Server |
Version: 6.0 ≤ cpe:2.3:a:trendmicro:endpoint_encryption_policy_server:6.0.0.4013:p1u6:*:*:*:*:*:* |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49212", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-18T14:56:50.316281Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-18T14:57:32.331Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:endpoint_encryption_policy_server:6.0.0.4013:p1u6:*:*:*:*:*:*" ], "product": "Trend Micro Endpoint Encryption Policy Server", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "6.0.0.4013", "status": "affected", "version": "6.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49220 but is in a different method." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-477", "description": "CWE-477: Use of Obsolete Function", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:27:37.318Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019928" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-369/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49212", "datePublished": "2025-06-17T20:27:37.318Z", "dateReserved": "2025-06-03T18:11:27.259Z", "dateUpdated": "2025-06-18T14:57:32.331Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49219 (GCVE-0-2025-49219)
Vulnerability from cvelistv5
Published
2025-06-17 17:43
Modified
2025-06-18 03:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-477 - Use of Obsolete Function
Summary
An insecure deserialization operation in Trend Micro Apex Central below versions 8.0.7007 could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49220 but is in a different method.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Apex Central |
Version: 8.0 ≤ cpe:2.3:a:trendmicro:apex_central:7007:*:*:en:*:windows_10:x86_64:1809 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49219", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-18T03:56:06.490Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:apex_central:7007:*:*:en:*:windows_10:x86_64:1809" ], "product": "Trend Micro Apex Central", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "8.0.7007", "status": "affected", "version": "8.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An insecure deserialization operation in Trend Micro Apex Central below versions 8.0.7007 could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49220 but is in a different method." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-477", "description": "CWE-477: Use of Obsolete Function", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T17:43:12.062Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019926" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-366/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49219", "datePublished": "2025-06-17T17:43:12.062Z", "dateReserved": "2025-06-03T18:11:27.260Z", "dateUpdated": "2025-06-18T03:56:06.490Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49218 (GCVE-0-2025-49218)
Vulnerability from cvelistv5
Published
2025-06-17 20:28
Modified
2025-06-18 03:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - SQL Injection
Summary
A post-auth SQL injection vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to escalate privileges on affected installations. This is similar to, but not identical to CVE-2025-49215.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro, Inc. | Trend Micro Endpoint Encryption Policy Server |
Version: 6.0 ≤ cpe:2.3:a:trendmicro:endpoint_encryption_policy_server:6.0.0.4013:p1u6:*:*:*:*:*:* |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49218", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-18T03:56:12.865Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:trendmicro:endpoint_encryption_policy_server:6.0.0.4013:p1u6:*:*:*:*:*:*" ], "product": "Trend Micro Endpoint Encryption Policy Server", "vendor": "Trend Micro, Inc.", "versions": [ { "lessThan": "6.0.0.4013", "status": "affected", "version": "6.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A post-auth SQL injection vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to escalate privileges on affected installations. This is similar to, but not identical to CVE-2025-49215.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: SQL Injection", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:28:22.211Z", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "url": "https://success.trendmicro.com/en-US/solution/KA-0019928" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-375/" } ] } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2025-49218", "datePublished": "2025-06-17T20:28:22.211Z", "dateReserved": "2025-06-03T18:11:27.260Z", "dateUpdated": "2025-06-18T03:56:12.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…