Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Trend Micro Apex One Management RCE Vulnerability Actively Exploited in the wild

Posted on August 6, 2025August 6, 2025 By CWS

Crucial command injection distant code execution (RCE) vulnerabilities in Development Micro Apex One Administration Console are at the moment being actively exploited by menace actors. 

The corporate confirmed observing at the very least one occasion of tried exploitation in manufacturing environments, prompting the instant launch of emergency mitigation instruments.

Key Takeaways1. Two RCE vulnerabilities actively exploited in Development Micro Apex One Administration Console.2. Development Micro launched FixTool_Aug2025.exe for instant safety.3. Apply emergency repair now for Apex One Administration Server Model 14039 and beneath.

Command Injection RCE Vulnerabilities

Two vital vulnerabilities have been recognized in Development Micro Apex One (on-premise) techniques, designated as CVE-2025-54948 and CVE-2025-54987. 

Each vulnerabilities carry a CVSS 3.1 rating of 9.4, indicating most severity danger. These command injection flaws, categorized below CWE-78: OS Command Injection, permit pre-authenticated distant attackers to add malicious code and execute arbitrary instructions on affected installations.

The vulnerabilities particularly goal Development Micro Apex One Administration Server Model 14039 and beneath on Home windows platforms. 

CVE-2025-54987 represents basically the identical vulnerability as CVE-2025-54948 however targets totally different CPU architectures, increasing the potential assault floor. 

Safety researchers from Development Micro’s Incident Response Crew and Jacky Hsieh from CoreCloud Tech, working with the Development Zero Day Initiative, are credited with responsibly disclosing these vital safety flaws.

The assault vector requires attackers to have entry to the Development Micro Apex One Administration Console, making organizations with externally uncovered console IP addresses significantly weak. 

Nonetheless, the pre-authenticated nature of those exploits implies that as soon as attackers achieve preliminary entry, they will escalate privileges and execute system-level instructions with out extra authentication boundaries.

CVE IDTitleCVSS 3.1 ScoreSeverityCVE-2025-54948CVE-2025-54987Management Console Command Injection RCE Vulnerability9.4CRITICAL

Mitigations 

Development Micro has launched an emergency repair instrument designated FixTool_Aug2025.exe with SHA-256 hash c945a885a31679a913802a2aefde52b672bb2c8ac98bbed52b723e6733c0eadc to offer instant safety in opposition to identified exploits. 

This short-term mitigation absolutely protects in opposition to present assault strategies however quickly disables the Distant Set up Agent operate for deploying brokers from the Administration Console.

Organizations utilizing Development Micro Apex One as a Service and Development Imaginative and prescient One Endpoint Safety acquired computerized safety by means of backend mitigations deployed on July 31, 2025, requiring no service downtime.

A complete Crucial Patch is predicted for launch in mid-August 2025, which is able to restore full Distant Set up Agent performance whereas sustaining safety protections.

Safety consultants strongly suggest instant software of the emergency repair instrument, significantly for organizations with internet-facing administration consoles, and implementing extra community segmentation and entry controls as defense-in-depth measures.

Equip your SOC with full entry to the newest menace information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Actively, Apex, Critical, Exploited, Management, Micro, RCE, Trend, Vulnerability, Wild

Post navigation

Previous Post: CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures
Next Post: Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems

Related Posts

13-Year-Old Dylan – Youngest Security Researcher Collaborates with Microsoft Security Response Center Cyber Security News
VS Code Extension Weaponized With Two Lines of Code Leads to Supply Chain Attack Cyber Security News
Cybercrime-as-a-Service – Countering Accessible Hacking Tools Cyber Security News
Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control Cyber Security News
BlackHat AI Hacking Tool WormGPT Variant Powered by Grok and Mixtral Cyber Security News
Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Exchange Server Vulnerability Enables Privelege Escalation
  • Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation
  • Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities
  • How to Secure Data in Transit and at Rest
  • Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Exchange Server Vulnerability Enables Privelege Escalation
  • Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation
  • Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities
  • How to Secure Data in Transit and at Rest
  • Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News