OS Command Injection Vulnerability Discovered in Trend Micro Apex One

OS Command Injection Vulnerability Discovered in Trend Micro Apex One

Information:

Trend Micro Apex One is an Endpoint Protection platform that supports both SaaS and On-Premises deployments, managed through a centralized console. It provides multi-layered cybersecurity protection, including antivirus, behavioral monitoring, application control, data loss prevention (DLP), and firewall capabilities. Leveraging machine learning combined with the Smart Protection Network, Apex One accurately detects advanced threats and zero-day attacks. Additionally, it features extended detection and response (XDR) capabilities that enable scanning, analysis, and investigation of incidents from a single console, enhancing the speed and efficiency of threat response.

Incident:

  Found critical security vulnerabilities CVE-2025-54948 and CVE-2025-54987 with a CVSS v3.1 score of 9.4 in the Trend Micro Apex One (on-premise) Management Console. These vulnerabilities stem from improper input validation, allowing OS command injection in the console that centrally manages and controls all endpoints within an organization. 

  An attacker can craft specially designed input to inject operating system commands into parameters sent to the Management Console without requiring authentication (pre-authenticated attack). The critical concern is that the Apex One Management Console operates with high-level privileges on the server, enabling it to install and manage agents on client machines, perform system updates, and execute scripts and commands on various endpoints. This makes the vulnerability extremely dangerous if successfully exploited.

An attacker could gain full control over the Management Console server, install backdoors for future access, steal user credentials and other sensitive information, spread malware or ransomware to all endpoints within the network, and use the server as a strategic pivot point to launch further attacks across the organization.

  The severity of this incident is significantly heightened by Trend Micro’s confirmation that these vulnerabilities have been actively exploited in the wild prior to the official public disclosure.

Recommendation:

  -  For the Trend Micro Apex One (on-premises) product, apply the emergency            update using FixTool_Aug2025 immediately.

  -  Avoid exposing the Management Console port directly to the internet; use         firewalls or ACLs to restrict access only to necessary internal networks.

         -  Monitor and apply the upcoming critical patch scheduled for mid-August 2025,      which will provide a complete fix for the vulnerabilities.

 

The important things is Security systems. We must concern and monitor as usual.
For more information please contact
Email :sales@inetms.co.th
065 149 2822 (Ms.Suphatson )
063 204 4534 (Ms.Atsamaphorn)
065 929 6330 (Ms.Kansinee)
0613879439 (Ms.Sirilak)
0922576902 (Ms.Narusorn)

 

References :

  - https://success.trendmicro.com/en-US/solution/KA-0020652

  - https://success.trendmicro.com/en-US/solution/KA-0009994

  - https://app.opencve.io/cve/CVE-2025-54948

  - https://app.opencve.io/cve/CVE-2025-54987

 

Weekly Interesting CVE

NO.

CVE Name

Published Date

Last Update

Device/Appplication/OS Target

Attack Type

CVSS
Severity Rating

Detail

Solution

Reference

1

CVE-2025-54597

27/07/2025

29/07/2025

Heimdall versions prior to 2.7.3

Cross-Site Scripting

7.2

An attacker can inject malicious JavaScript code into the value of the q parameter, causing it to execute in the user's browser. This could lead to data theft or unauthorized control over certain system functions.

Update Heimdall to version 2.7.3 or later.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49699

2

CVE-2025-54569

28/07/2025

29/07/2026

Malwarebytes Binisoft Windows Firewall Control versions before 6.16.0.0

Local Privilege Escalation

4.5

An attacker with low-level privileges on the machine can exploit this vulnerability during the program installation process to elevate their privileges to Administrator. This could allow them to take control of the system or perform actions that would normally be restricted.

Update to version 6.16.0.0 or later.

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6

3

CVE-2025-54576

30/07/2025

31/07/2027

OAuth2-Proxy in version 7.10.0 and below

Authentication Bypass

9.1

An attacker can bypass the authentication process by crafting a URL with query parameters that match the regex patterns defined in skip_auth_routes, allowing unauthorized access to resources that should be protected.

Update to version 7.11.0.

https://www.cvedetails.com/cve/CVE-2025-54576/

 

 4

CVE-2025-36594

04/08/2025

04/08/2025

Dell PowerProtect Data Domain running (DD OS) versions:
Feature Release: versions 7.7.1.0 through 8.3.0.15
LTS 2024 Release: versions 7.13.1.0 through 7.13.1.25
LTS 2023 Release: versions 7.10.1.0 through 7.10.1.60

Authentication Bypass

9.8

An unauthenticated remote attacker can exploit this vulnerability to bypass the system’s protection mechanisms and potentially create a new user account.

Update to the following versions:
Feature Release: version 8.3.0.15 or later
LTS 2024 (7.13.1): version 7.13.1.30 or later
LTS 2023 (7.10.1): version 7.10.1.60 or later

https://www.cvedetails.com/cve/CVE-2025-36594/

5

CVE-2025-54782

02/08/2025

04/08/2025

Nest versions 0.2.0 and below

Remote Code Execution

9.4

This package adds HTTP endpoints to the NestJS development server.
One of the vulnerable endpoints is /inspector/graph/interact,
which accepts JSON input containing a code field and executes that code using Node.js's vm.runInNewContext

Update to version 0.2.1.

https://www.cvedetails.com/cve/CVE-2025-54782/


Malware News or Campaign IOC/IOA | EN

No

Campaign Name

Detection Date

Attack

Type

 

Description

 

Mitigation/Remediation

1

ToolShell​

28/07/2025

Ransomware

A new vulnerability known as ToolShell has been actively exploited against on-premises Microsoft SharePoint servers worldwide. Attackers can execute remote code without login, steal cryptographic keys, create web shells, and bypass MFA.

  • Install and use antivirus devices.​
  • Update patches immediately (KB5002768, KB5002754, KB5002760).​
  • Restrict access rights.

Ref:https://thehackernews.com/2025/07/critical-microsoft-sharepoint-flaw.html

 

22 August 2025

Viewed 189 time

Engine by shopup.com