Date: 18 June 2025

Multiple critical vulnerabilities have been discovered in Trend Micro Apex Central (on-premises) and Trend Micro Endpoint Encryption Policy Server. These flaws include insecure deserialization and authentication bypass issues that could allow unauthenticated remote code execution or administrative access, leading to full system compromise.

 

Overview

These vulnerabilities stem from unsafe deserialization processes and flawed authentication checks. If exploited, attackers could execute arbitrary code or bypass authentication mechanisms, without needing valid credentials. The impact includes potential full takeover of affected systems, disruption of endpoint policies, and unauthorised administrative changes across environments using vulnerable versions of Trend Micro software.

 

Trend Micro Apex Central (On-Premises)

CVE-2025-49219

CVE-2025-49220

 

Trend Micro Endpoint Encryption Policy Server

CVE-2025-49212

CVE-2025-49213

CVE-2025-49216

CVE-2025-49217

General Recommendations

  • Patch immediately: Upgrade to the fixed versions for all affected products.
  • Restrict remote access: Limit exposure of management interfaces and ensure perimeter security is up to date.
  • Monitor systems: Review logs for suspicious activity and indicators of compromise.
  • Apply network protections: Use available IPS/IDS rules if you have Trend Micro TippingPoint or Cloud One Network Security.

Need Help?

If your organisation requires assistance identifying affected systems, applying updates or adjusting controller configurations, our team is here to help. Email us via soc@secure-iss.com for assistance.