Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Trend Micro Apex One Management RCE Vulnerability Actively Exploited in the wild

Critical Trend Micro Apex One Management RCE Vulnerability Actively Exploited in the wild

Posted on August 6, 2025August 6, 2025 By CWS

Crucial command injection distant code execution (RCE) vulnerabilities in Development Micro Apex One Administration Console are at the moment being actively exploited by menace actors. 

The corporate confirmed observing at the very least one occasion of tried exploitation in manufacturing environments, prompting the instant launch of emergency mitigation instruments.

Key Takeaways1. Two RCE vulnerabilities actively exploited in Development Micro Apex One Administration Console.2. Development Micro launched FixTool_Aug2025.exe for instant safety.3. Apply emergency repair now for Apex One Administration Server Model 14039 and beneath.

Command Injection RCE Vulnerabilities

Two vital vulnerabilities have been recognized in Development Micro Apex One (on-premise) techniques, designated as CVE-2025-54948 and CVE-2025-54987. 

Each vulnerabilities carry a CVSS 3.1 rating of 9.4, indicating most severity danger. These command injection flaws, categorized below CWE-78: OS Command Injection, permit pre-authenticated distant attackers to add malicious code and execute arbitrary instructions on affected installations.

The vulnerabilities particularly goal Development Micro Apex One Administration Server Model 14039 and beneath on Home windows platforms. 

CVE-2025-54987 represents basically the identical vulnerability as CVE-2025-54948 however targets totally different CPU architectures, increasing the potential assault floor. 

Safety researchers from Development Micro’s Incident Response Crew and Jacky Hsieh from CoreCloud Tech, working with the Development Zero Day Initiative, are credited with responsibly disclosing these vital safety flaws.

The assault vector requires attackers to have entry to the Development Micro Apex One Administration Console, making organizations with externally uncovered console IP addresses significantly weak. 

Nonetheless, the pre-authenticated nature of those exploits implies that as soon as attackers achieve preliminary entry, they will escalate privileges and execute system-level instructions with out extra authentication boundaries.

CVE IDTitleCVSS 3.1 ScoreSeverityCVE-2025-54948CVE-2025-54987Management Console Command Injection RCE Vulnerability9.4CRITICAL

Mitigations 

Development Micro has launched an emergency repair instrument designated FixTool_Aug2025.exe with SHA-256 hash c945a885a31679a913802a2aefde52b672bb2c8ac98bbed52b723e6733c0eadc to offer instant safety in opposition to identified exploits. 

This short-term mitigation absolutely protects in opposition to present assault strategies however quickly disables the Distant Set up Agent operate for deploying brokers from the Administration Console.

Organizations utilizing Development Micro Apex One as a Service and Development Imaginative and prescient One Endpoint Safety acquired computerized safety by means of backend mitigations deployed on July 31, 2025, requiring no service downtime.

A complete Crucial Patch is predicted for launch in mid-August 2025, which is able to restore full Distant Set up Agent performance whereas sustaining safety protections.

Safety consultants strongly suggest instant software of the emergency repair instrument, significantly for organizations with internet-facing administration consoles, and implementing extra community segmentation and entry controls as defense-in-depth measures.

Equip your SOC with full entry to the newest menace information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Actively, Apex, Critical, Exploited, Management, Micro, RCE, Trend, Vulnerability, Wild

Post navigation

Previous Post: CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures
Next Post: Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems

Related Posts

New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways Cyber Security News
CISOs Guide to Regulatory Compliance in Global Landscapes CISOs Guide to Regulatory Compliance in Global Landscapes Cyber Security News
Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware Cyber Security News
Bitter Malware Using Custom-Developed Tools To Evade Detection In Sophisticated Attacks Bitter Malware Using Custom-Developed Tools To Evade Detection In Sophisticated Attacks Cyber Security News
LLMs are Accelerating the Ransomware Lifecycle to Gain Speed, Volume, and Multilingual Reach LLMs are Accelerating the Ransomware Lifecycle to Gain Speed, Volume, and Multilingual Reach Cyber Security News
Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Remote File Upload Vulnerability in Cisco Meeting Management
  • Critical Security Updates Released by Cisco and F5
  • DesckVB RAT 2.9: Advanced Threat with Modular Plugins
  • APT28 Exploits Microsoft Office Flaw Targeting Europe
  • Critical n8n Vulnerability Allows System Commands Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Remote File Upload Vulnerability in Cisco Meeting Management
  • Critical Security Updates Released by Cisco and F5
  • DesckVB RAT 2.9: Advanced Threat with Modular Plugins
  • APT28 Exploits Microsoft Office Flaw Targeting Europe
  • Critical n8n Vulnerability Allows System Commands Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark