Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Trend Micro Patches Apex One Vulnerabilities Exploited in Wild

Trend Micro Patches Apex One Vulnerabilities Exploited in Wild

Posted on August 6, 2025August 6, 2025 By CWS

Development Micro is urging customers of the on-premises model of its Apex One endpoint safety resolution to put in updates that patch two zero-day vulnerabilities.

An advisory printed by the safety agency on Tuesday warns prospects that two important vulnerabilities tracked as CVE-2025-54948 and CVE-2025-54987 have been exploited within the wild in at the very least one occasion.

The safety holes, described as OS command injection points, affect the Apex One administration console and they are often exploited by a distant, unauthenticated attacker to add malicious code and execute instructions on impacted installations.

CVE-2025-54987 is described as “primarily the identical as CVE-2025-54948” however affecting a special CPU structure.

“For this explicit vulnerability, an attacker will need to have entry to the Development Micro Apex One Administration Console, so prospects which have their console’s IP handle uncovered externally ought to take into account mitigating components resembling supply restrictions if not already utilized,” Development Micro informed prospects.

In keeping with advisories printed by ZDI, the vulnerabilities have been reported to Development Micro on August 1 and it appears the corporate rushed to patch them.

No info has been shared on the zero-day assaults exploiting CVE-2025-54948 and/or CVE-2025-54987, however Chinese language cyberspies have been recognized to focus on Development Micro product vulnerabilities. 

Jacky Hsieh of Taiwan-based cybersecurity firm CoreCloud Tech has been credited for reporting the vulnerabilities. Contemplating that Taiwan is commonly a goal of Chinese language APT assaults, this implies that Chinese language risk actors could also be behind the newest Development Micro zero-day exploitation. Commercial. Scroll to proceed studying.

It’s not unusual for risk actors to focus on Development Micro product vulnerabilities of their assaults. CISA’s Recognized Exploited Vulnerabilities (KEV) catalog reveals that ten Development Micro flaws have been exploited within the wild since 2018.

Associated: ESET Vulnerability Exploited for Stealthy Malware Execution

Associated: Important Vulnerabilities Patched in Development Micro Apex Central, Endpoint Encryption

Associated: Development Micro Patches One other Apex One Vulnerability Exploited in Assaults

Security Week News Tags:Apex, Exploited, Micro, Patches, Trend, Vulnerabilities, Wild

Post navigation

Previous Post: UAC-0099 Hackers Weaponizing HTA Files to Deliver MATCHBOIL Loader Malware
Next Post: Mustang Panda Attacking Windows Users With ToneShell Malware Mimic as Google Chrome

Related Posts

New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches Security Week News
Root Evidence Launches With .5 Million in Seed Funding Root Evidence Launches With $12.5 Million in Seed Funding Security Week News
CISA Warns of CWP Vulnerability Exploited in the Wild CISA Warns of CWP Vulnerability Exploited in the Wild Security Week News
Global Effort Shuts Down Tycoon 2FA Phishing Network Global Effort Shuts Down Tycoon 2FA Phishing Network Security Week News
Urgent Patch Needed for Critical Citrix NetScaler Vulnerability Urgent Patch Needed for Critical Citrix NetScaler Vulnerability Security Week News
Critical Microsens Product Flaws Allow Hackers to Go ‘From Zero to Hero’ Critical Microsens Product Flaws Allow Hackers to Go ‘From Zero to Hero’ Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark