Trend Micro warns of critical Apex Central RCE vulnerability
Severity: CRITICAL (CVE-2025-69258)
CVSS 3.0 Score : 9.8

Information
Apex Central is a web-based management console that helps admins manage multiple Trend Micro products and services (including antivirus, content security, and threat detection) and deploy components like antivirus pattern files, scan engines, and antispam rules from a single interface.
Incident
Japanese cybersecurity software firm Trend Micro has patched a critical security flaw in Apex Central (on-premise) that could allow attackers to execute arbitrary code with SYSTEM privileges.
Tracked as CVE-2025-69258, the vulnerability enables threat actors without privileges on the targeted system to gain remote code execution by injecting malicious DLLs in low-complexity attacks that don't require user interaction.
As explained by cybersecurity company Tenable, which reported the flaw and shared technical details and proof-of-concept code, unauthenticated remote attackers can send a specially crafted message to the MsgReceiver.exe process listening on TCP port 20001, "leading to execution of attacker-supplied code under the security context of SYSTEM.
While there are mitigating factors, like vulnerable systems being exposed to Internet attacks, Trend Micro urged customers to patch their systems as soon as possible.
Recommendation
The important things is Security systems. We must concern and monitor as usual.
For more information please contact
Email :sales@inetms.co.th
065 149 2822 (Ms.Suphatson )
063 204 4534 (Ms.Atsamaphorn)
065 929 6330 (Ms.Kansinee)
061 387 9439 (Ms.Sirilak)
092 257 6902 (Ms.Narusorn)
063 197 7510 (Mr.Yanotai)
065 725 7405 (Ms.Nattharini)
065 725 7405 (Ms.Donraya)
References
Weekly Interesting CVE
| NO. |
CVE Name |
Published Date |
Last Update |
Device/Appplication/OS Target |
Attack Type |
CVSS |
Detail |
Solution |
Reference |
|---|---|---|---|---|---|---|---|---|---|
| 1 |
CVE-2025-68865 |
5/1/2026 |
5/1/2026 |
Infility Global Plugin for WordPress < 2.14.48 |
SQL Injection |
9.3 |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Infility Infility Global allows SQL Injection.This issue affects Infility Global: from n/a through 2.14.48. |
Update to 2.14.49 |
https://www.cvedetails.com/cve/CVE-2025-68865/
|
| 2 |
CVE-2025-47411 |
1/1/2026 |
5/1/2026 |
Apache StreamPipes < 0.97.0 |
Privilege Escalation |
8.1 |
A user with a legitimate non-administrator account can exploit a vulnerability in the user ID creation mechanism in Apache StreamPipes that allows them to swap the username of an existing user with that of an administrator. |
Update to 0.98.0 |
|
| 3 |
CVE-2021-47744 |
31/12/2025 |
2/1/2026 |
Cypress Solutions CTM-200 < 1.3.6 |
Hard-coded Credentials |
7.5 |
Cypress Solutions CTM-200/CTM-ONE 1.3.6 contains hard-coded credentials vulnerability in Linux distribution that exposes root access. Attackers can exploit the static 'Chameleon' password to gain remote root access via Telnet or SSH on affected devices.. |
Update to 1.3.6 and disable access via Port 23 and Port 22 if not needed. |
https://app.opencve.io/cve/CVE-2021-47744
|
| 4 |
CVE-2025-59503 |
23/10/2025 |
2/1/2026 |
Azure Compute Gallery |
Server-Side Request Forgery (SSRF) |
10 |
Server-side request forgery (ssrf) in Azure Compute Gallery allows an unauthorized attacker to elevate privileges over a network. |
This is a vulnerability in the Microsoft Azure (Cloud Provider) infrastructure, so the response focuses on updates from the provider's side. |
|
| 5 |
CVE-2026-0592 |
1/1/2026 |
5/1/2026 |
Online Product Reservation System < 1.0 |
SQL Injection |
7.3 |
A security flaw has been discovered in code-projects Online Product Reservation System 1.0. This affects an unknown function of the file /handgunner-administrator/register_code.php of the component User Registration Handler. |
Update to 1.0 |
https://app.opencve.io/cve/CVE-2026-0592 |
Malware News or Campaign IOC/IOA | EN
|
No |
Campaign Name |
Detection Date |
Attack Type |
Description |
Mitigation/Remediation |
|---|---|---|---|---|---|
| 1 |
Zoom Stealer browser extensions harvest corporate meeting intelligence |
30/12/2025 |
Malware |
A new malware campaign called “Zoom Stealer” has been discovered. It disguises itself as browser extensions on Chrome, Firefox, and Microsoft Edge and has been downloaded more than 2.2 million times. These malicious extensions collect detailed information related to online meetings, and the harvested data is transmitted to the attackers in real time. |
|
19 January 2026
Viewed 148 time