Trend Micro issued the patches on January 7, 2026, urging all affected customers to update immediately.
The most severe vulnerability, CVE-2025-69258, carries a CVSS score of 9.8 and involves a LoadLibraryEX flaw. This vulnerability enables unauthenticated remote attackers to load malicious DLL files into critical executables.
| CVE ID | Vulnerability Type | CVSS | Description |
|---|---|---|---|
| CVE-2025-69258 | LoadLibraryEX RCE | 9.8 | Attackers can load malicious DLLs to execute code as SYSTEM |
| CVE-2025-69259 | NULL Return DoS | 7.5 | Improper message handling can trigger denial-of-service remotely |
| CVE-2025-69260 | Out-of-bounds Read DoS | 7.5 | Out-of-bounds reads can cause remote denial-of-service |
Potentially allowing code execution with SYSTEM privileges without user interaction. The other two vulnerabilities, CVE-2025-69259 and CVE-2025-69260, both carry CVSS scores of 7.5 and relate to improper message handling.
These flaws could permit remote attackers to trigger denial-of-service conditions on affected systems.
Notably, neither vulnerability requires authentication to exploit, making them particularly dangerous in exposed environments.
The vulnerabilities impact Trend Micro Apex Central (on-premise) versions below Build 7190 running on Windows platforms.
Organizations using earlier versions face significant risk from unauthenticated remote attacks that could compromise system integrity and availability.
Trend Micro has released Critical Patch Build 7190 to resolve all three vulnerabilities. The patch is now available through Trend Micro’s Download Center, along with comprehensive release notes to guide deployment.
The company strongly recommends customers prioritize installing this critical patch as soon as possible.
While patches are essential, Trend Micro advises organizations to review remote access policies for critical systems and ensure perimeter security measures remain up to date.
Additional protective measures include restricting network access to Apex Central instances and implementing strict authentication controls.
Trend Micro acknowledged security researchers at Tenable for responsibly disclosing these vulnerabilities, enabling swift remediation efforts that protect the broader customer base from exploitation.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Trend Micro Apex Central Vulnerabilities Enables Remote Code Execution Attacks appeared first on Cyber Security News.
Jostling a folded piece of paper, holding it marooned in the air, selectman Beth Blair…
Boscawen voters cruised through a speedy town meeting Friday night, one with so little controversy…
Happy Saturday, all! This week, we found a number of deals that should help you…
Though it was weird to see the Golden Globes partner with Polymarket for its most…
Neo to the left of me. Pros are to the right. | Photo: Antonio G.…
Zendesk is to acquire Forethought AI. It says that this will be its largest acquisition…
This website uses cookies.