CVE-2025-54987
Trend · Trend Micro Apex One (on-premise)
A critical vulnerability has been identified in the Trend Micro Apex One on-premise management console.
Executive summary
A critical vulnerability has been identified in the Trend Micro Apex One on-premise management console. This flaw allows a remote attacker, without needing any credentials, to upload malicious files and execute arbitrary code, potentially leading to a full compromise of the security management server and the endpoints it protects. This represents a severe risk of data breach, ransomware deployment, and lateral movement within the network.
Vulnerability
This is a pre-authentication remote code execution (RCE) vulnerability. An unauthenticated attacker can exploit a flaw in the management console's file upload mechanism to upload a malicious file, such as a web shell. By then accessing the uploaded file, the attacker can execute commands on the underlying server with the privileges of the Apex One service, leading to a complete system compromise.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.4. Successful exploitation would grant an attacker full control over the Trend Micro Apex One server, a central component of an organization's endpoint security infrastructure. This could lead to catastrophic consequences, including the ability to disable security agents on all managed endpoints, deploy ransomware or other malware across the enterprise, exfiltrate sensitive corporate data, and use the compromised server as a trusted pivot point to attack other internal systems.
Remediation
Immediate Action: Immediately apply the security patches released by Trend Micro to update Trend Micro Apex One to the latest secure version. After patching, it is crucial to review historical access logs for any suspicious activity that may have occurred prior to the update.
Proactive Monitoring: Monitor the Apex One server for indicators of compromise. This includes reviewing web server access logs for unusual POST requests or attempts to access suspicious files (e.g., .jsp, .aspx, .php files in upload directories). Monitor for unexpected processes spawned by the Apex One services (e.g., cmd.exe, powershell.exe) and anomalous outbound network connections from the server.
Compensating Controls: If patching cannot be performed immediately, restrict network access to the Apex One management console. Use a firewall or network access control lists (ACLs) to ensure that the console is only accessible from a limited set of trusted administrative IP addresses.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability represents a critical and immediate threat to the organization. A pre-authenticated remote code execution flaw in a central security product like Apex One is a worst-case scenario. We strongly recommend that the remediation plan be executed with the highest priority. The vendor-supplied patches must be applied immediately to all affected on-premise instances. Until patching is complete, access to the management console should be strictly limited as a compensating control.