Trend Micro addresses critical security flaws in on-premises Apex Central
- Jan 9
- 2 min read
Key Findings
Trend Micro patched three vulnerabilities (CVE-2025-69258, CVE-2025-69259, CVE-2025-69260) in its Apex Central management console.
The most severe issue is a LoadLibraryEX remote code execution (RCE) vulnerability tracked as CVE-2025-69258, with a CVSS score of 9.8.
The other vulnerabilities are an unchecked NULL return value Denial of Service (DoS) issue (CVE-2025-69259) and a message out-of-bounds read Denial of Service (DoS) flaw (CVE-2025-69260), both with a CVSS score of 7.5.
The vulnerabilities were discovered by Tenable in August 2025 and could enable remote code execution or denial-of-service attacks.
Background
In August 2025, Tenable discovered and disclosed details and proof-of-concept (PoC) code for the vulnerabilities in Trend Micro's Apex Central management console. The affected versions are below Build 7190 of the on-premise Apex Central product running on Windows.
Remote Code Execution (RCE) Vulnerability
The most severe issue is a LoadLibraryEX remote code execution (RCE) vulnerability tracked as CVE-2025-69258, with a CVSS score of 9.8. This vulnerability could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to the execution of attacker-supplied code under the context of SYSTEM on affected installations.
Denial of Service (DoS) Vulnerabilities
The other two vulnerabilities, tracked as CVE-2025-69259 and CVE-2025-69260, are an unchecked NULL return value Denial of Service (DoS) issue and a message out-of-bounds read Denial of Service (DoS) flaw, respectively. Both have a CVSS score of 7.5 and can be exploited by unauthenticated remote attackers to create denial-of-service conditions on affected systems.
Vendor Response
Trend Micro has released security updates to address the vulnerabilities. Customers are urged to promptly apply the patches, limit remote access, and keep their security controls up to date to mitigate the risks.
Sources
https://securityaffairs.com/186733/hacking/trend-micro-fixed-a-remote-code-execution-in-apex-central.html
https://thehackernews.com/2026/01/trend-micro-apex-central-rce-flaw.html
https://www.bleepingcomputer.com/news/security/trend-micro-fixes-critical-rce-flaw-in-apex-central-console/
https://www.facebook.com/thehackernews/posts/-trend-micro-patched-a-critical-flaw-in-on-prem-apex-central-for-windows-that-ca/1264238429074071/
https://www.techzine.eu/news/security/137798/trend-micro-closes-critical-vulnerabilities-in-apex-central/


Comments