Categories: Cyber Security News

Trend Micro Apex Central Vulnerabilities Enables Remote Code Execution Attacks

Critical security patches to address three severe vulnerabilities affecting Apex Central (on-premise) that could allow remote attackers to execute malicious code or launch denial-of-service attacks on vulnerable systems.

Trend Micro issued the patches on January 7, 2026, urging all affected customers to update immediately.

The most severe vulnerability, CVE-2025-69258, carries a CVSS score of 9.8 and involves a LoadLibraryEX flaw. This vulnerability enables unauthenticated remote attackers to load malicious DLL files into critical executables.

CVE ID Vulnerability Type CVSS Description
CVE-2025-69258 LoadLibraryEX RCE 9.8 Attackers can load malicious DLLs to execute code as SYSTEM
CVE-2025-69259 NULL Return DoS 7.5 Improper message handling can trigger denial-of-service remotely
CVE-2025-69260 Out-of-bounds Read DoS 7.5 Out-of-bounds reads can cause remote denial-of-service

Potentially allowing code execution with SYSTEM privileges without user interaction. The other two vulnerabilities, CVE-2025-69259 and CVE-2025-69260, both carry CVSS scores of 7.5 and relate to improper message handling.

These flaws could permit remote attackers to trigger denial-of-service conditions on affected systems.

Notably, neither vulnerability requires authentication to exploit, making them particularly dangerous in exposed environments.

The vulnerabilities impact Trend Micro Apex Central (on-premise) versions below Build 7190 running on Windows platforms.

Organizations using earlier versions face significant risk from unauthenticated remote attacks that could compromise system integrity and availability.

Trend Micro has released Critical Patch Build 7190 to resolve all three vulnerabilities. The patch is now available through Trend Micro’s Download Center, along with comprehensive release notes to guide deployment.

Sponsored

The company strongly recommends customers prioritize installing this critical patch as soon as possible.

While patches are essential, Trend Micro advises organizations to review remote access policies for critical systems and ensure perimeter security measures remain up to date.

Additional protective measures include restricting network access to Apex Central instances and implementing strict authentication controls.

Trend Micro acknowledged security researchers at Tenable for responsibly disclosing these vulnerabilities, enabling swift remediation efforts that protect the broader customer base from exploitation.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Trend Micro Apex Central Vulnerabilities Enables Remote Code Execution Attacks appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Canterbury town meeting progresses with congeniality, efficiency and some humor

Jostling a folded piece of paper, holding it marooned in the air, selectman Beth Blair…

2 hours ago

Boscawen voters address bus service concerns

Boscawen voters cruised through a speedy town meeting Friday night, one with so little controversy…

2 hours ago

Hulu, Disney Plus, and the Pixel Watch 4 are among this week’s best deals

Happy Saturday, all! This week, we found a number of deals that should help you…

3 hours ago

Prediction markets want the Oscars to be your gateway drug to betting on everything

Though it was weird to see the Golden Globes partner with Polymarket for its most…

4 hours ago

MacBook Air M5 review: a small update for the ‘just right’ Mac

Neo to the left of me. Pros are to the right. | Photo: Antonio G.…

4 hours ago

Zendesk to acquire Forethought AI to drive autonomous AI agents

Zendesk is to acquire Forethought AI. It says that this will be its largest acquisition…

4 hours ago

This website uses cookies.