Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption

Posted on June 13, 2025June 13, 2025 By CWS

Pattern Micro has launched patches for ten vulnerabilities in Apex Central and Endpoint Encryption (TMEE) PolicyServer, together with critical-severity flaws resulting in distant code execution (RCE).

The replace for Apex Central resolves two important bugs resulting in RCE, tracked as CVE-2025-49219 and CVE-2025-49220 (CVSS rating of 9.8). The safety defects are comparable, however had been found in numerous strategies, the corporate says.

Each vulnerabilities are described as an insecure deserialization operation that would enable distant attackers to execute arbitrary code on affected installations, with out authentication.

Endpoint Encryption PolicyServer acquired fixes for eight flaws, together with 4 important and 4 high-severity defects.

Three of the important points are described as deserialization of untrusted information that would result in unauthenticated RCE.

Tracked as CVE-2025-49212, CVE-2025-49213, and CVE-2025-49217 (CVSS rating of 9.8), the bugs are comparable, however impression completely different strategies. The corporate says the primary is much like the Apex Central vulnerability CVE-2025-49220.

The fourth critical-severity vulnerability resolved in Endpoint Encryption PolicyServer, CVE-2025-49216 (CVSS rating of 9.8), is an authentication bypass subject permitting “an attacker to entry key strategies as an admin consumer and modify product configurations”.

Of the high-severity flaws resolved, three are SQL injection bugs that would result in privilege escalation, whereas the fourth is an insecure deserialization resulting in RCE. All 4 require that an attacker first obtains “the flexibility to execute low-privileged code on the goal system”.Commercial. Scroll to proceed studying.

All ten vulnerabilities had been disclosed by the Zero Day Initiative (ZDI), however Pattern Micro says that none of them has been noticed being exploited within the wild. Nevertheless, customers are suggested to use the out there patches as quickly as doable.

Associated: Palo Alto Networks Patches Privilege Escalation Vulnerabilities

Associated: Fortinet, Ivanti Patch Excessive-Severity Vulnerabilities

Associated: ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, CISA

Associated: Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’

Security Week News Tags:Apex, Central, Critical, Encryption, Endpoint, Micro, Patched, Trend, Vulnerabilities

Post navigation

Previous Post: Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware
Next Post: Ransomware Actors Exploit Unpatched SimpleHelp RMM to Compromise Billing Software Provider

Related Posts

NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms Security Week News
Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough Security Week News
Two Exploited Vulnerabilities Patched in Android Security Week News
Cryptojackers Caught Mining Monero via Exposed DevOps Infrastructure Security Week News
CISO Conversations: Are Microsoft’s Deputy CISOs a Signpost to the Future? Security Week News
SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Warns of VMware Tools and Aria Operations 0-Day Vulnerability Exploited in Attacks
  • New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials
  • New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content
  • New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins
  • 700+ Malicious Android Apps Abusing NFC Relay to Exfiltrate Banking Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Warns of VMware Tools and Aria Operations 0-Day Vulnerability Exploited in Attacks
  • New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials
  • New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content
  • New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins
  • 700+ Malicious Android Apps Abusing NFC Relay to Exfiltrate Banking Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News