Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems

Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems

Posted on August 6, 2025August 6, 2025 By CWS

Aug 06, 2025Ravie LakshmananVulnerability / Endpoint Safety
Pattern Micro has launched mitigations to handle vital safety flaws in on-premise variations of Apex One Administration Console that it mentioned have been exploited within the wild.
The vulnerabilities (CVE-2025-54948 and CVE-2025-54987), each rated 9.4 on the CVSS scoring system, have been described as administration console command injection and distant code execution flaws.
“A vulnerability in Pattern Micro Apex One (on-premise) administration console might permit a pre-authenticated distant attacker to add malicious code and execute instructions on affected installations,” the cybersecurity firm mentioned in a Tuesday advisory.
Whereas each shortcomings are basically the identical, CVE-2025-54987 targets a unique CPU structure. The Pattern Micro Incident Response (IR) Group and Jacky Hsieh at CoreCloud Tech have been credited with reporting the 2 flaws.

There are at the moment no particulars on how the problems are being exploited in real-world assaults. Pattern Micro mentioned it “noticed at the least one occasion of an try to actively exploit certainly one of these vulnerabilities within the wild.”
Mitigations for Pattern Micro Apex One as a Service have already been deployed as of July 31, 2025. A brief-term answer for on-premise variations is offered within the type of a repair device. A proper patch for the vulnerabilities is anticipated to be launched in mid-August 2025.
Nonetheless, Pattern Micro identified that whereas the device totally protects towards recognized exploits, it would disable the power for directors to make the most of the Distant Set up Agent operate to deploy brokers from the Pattern Micro Apex One Administration Console. It emphasised that different agent set up strategies, reminiscent of UNC path or agent package deal, are unaffected.
“Exploiting these sort of vulnerabilities typically require that an attacker has entry (bodily or distant) to a susceptible machine,” the corporate mentioned. “Along with well timed utility of patches and up to date options, clients are additionally suggested to evaluate distant entry to vital programs and guarantee insurance policies and perimeter safety is up-to-date.”

The Hacker News Tags:Active, Apex, Confirms, Critical, Exploitation, Flaws, Micro, OnPremise, Systems, Trend

Post navigation

Previous Post: Critical Trend Micro Apex One Management RCE Vulnerability Actively Exploited in the wild
Next Post: Adobe Issues Out-of-Band Patches for AEM Forms Vulnerabilities With Public PoC

Related Posts

Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control The Hacker News
Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware The Hacker News
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts The Hacker News
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog The Hacker News
Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware The Hacker News
Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News