top of page

Trend Micro addresses critical security flaws in on-premises Apex Central

  • Jan 9
  • 2 min read

Key Findings


  • Trend Micro patched three vulnerabilities (CVE-2025-69258, CVE-2025-69259, CVE-2025-69260) in its Apex Central management console.

  • The most severe issue is a LoadLibraryEX remote code execution (RCE) vulnerability tracked as CVE-2025-69258, with a CVSS score of 9.8.

  • The other vulnerabilities are an unchecked NULL return value Denial of Service (DoS) issue (CVE-2025-69259) and a message out-of-bounds read Denial of Service (DoS) flaw (CVE-2025-69260), both with a CVSS score of 7.5.

  • The vulnerabilities were discovered by Tenable in August 2025 and could enable remote code execution or denial-of-service attacks.


Background


In August 2025, Tenable discovered and disclosed details and proof-of-concept (PoC) code for the vulnerabilities in Trend Micro's Apex Central management console. The affected versions are below Build 7190 of the on-premise Apex Central product running on Windows.


Remote Code Execution (RCE) Vulnerability


The most severe issue is a LoadLibraryEX remote code execution (RCE) vulnerability tracked as CVE-2025-69258, with a CVSS score of 9.8. This vulnerability could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to the execution of attacker-supplied code under the context of SYSTEM on affected installations.


Denial of Service (DoS) Vulnerabilities


The other two vulnerabilities, tracked as CVE-2025-69259 and CVE-2025-69260, are an unchecked NULL return value Denial of Service (DoS) issue and a message out-of-bounds read Denial of Service (DoS) flaw, respectively. Both have a CVSS score of 7.5 and can be exploited by unauthenticated remote attackers to create denial-of-service conditions on affected systems.


Vendor Response


Trend Micro has released security updates to address the vulnerabilities. Customers are urged to promptly apply the patches, limit remote access, and keep their security controls up to date to mitigate the risks.


Sources


  • https://securityaffairs.com/186733/hacking/trend-micro-fixed-a-remote-code-execution-in-apex-central.html

  • https://thehackernews.com/2026/01/trend-micro-apex-central-rce-flaw.html

  • https://www.bleepingcomputer.com/news/security/trend-micro-fixes-critical-rce-flaw-in-apex-central-console/

  • https://www.facebook.com/thehackernews/posts/-trend-micro-patched-a-critical-flaw-in-on-prem-apex-central-for-windows-that-ca/1264238429074071/

  • https://www.techzine.eu/news/security/137798/trend-micro-closes-critical-vulnerabilities-in-apex-central/

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page