Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption

Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption

Posted on June 13, 2025June 13, 2025 By CWS

Pattern Micro has launched patches for ten vulnerabilities in Apex Central and Endpoint Encryption (TMEE) PolicyServer, together with critical-severity flaws resulting in distant code execution (RCE).

The replace for Apex Central resolves two important bugs resulting in RCE, tracked as CVE-2025-49219 and CVE-2025-49220 (CVSS rating of 9.8). The safety defects are comparable, however had been found in numerous strategies, the corporate says.

Each vulnerabilities are described as an insecure deserialization operation that would enable distant attackers to execute arbitrary code on affected installations, with out authentication.

Endpoint Encryption PolicyServer acquired fixes for eight flaws, together with 4 important and 4 high-severity defects.

Three of the important points are described as deserialization of untrusted information that would result in unauthenticated RCE.

Tracked as CVE-2025-49212, CVE-2025-49213, and CVE-2025-49217 (CVSS rating of 9.8), the bugs are comparable, however impression completely different strategies. The corporate says the primary is much like the Apex Central vulnerability CVE-2025-49220.

The fourth critical-severity vulnerability resolved in Endpoint Encryption PolicyServer, CVE-2025-49216 (CVSS rating of 9.8), is an authentication bypass subject permitting “an attacker to entry key strategies as an admin consumer and modify product configurations”.

Of the high-severity flaws resolved, three are SQL injection bugs that would result in privilege escalation, whereas the fourth is an insecure deserialization resulting in RCE. All 4 require that an attacker first obtains “the flexibility to execute low-privileged code on the goal system”.Commercial. Scroll to proceed studying.

All ten vulnerabilities had been disclosed by the Zero Day Initiative (ZDI), however Pattern Micro says that none of them has been noticed being exploited within the wild. Nevertheless, customers are suggested to use the out there patches as quickly as doable.

Associated: Palo Alto Networks Patches Privilege Escalation Vulnerabilities

Associated: Fortinet, Ivanti Patch Excessive-Severity Vulnerabilities

Associated: ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, CISA

Associated: Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’

Security Week News Tags:Apex, Central, Critical, Encryption, Endpoint, Micro, Patched, Trend, Vulnerabilities

Post navigation

Previous Post: Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware
Next Post: Ransomware Actors Exploit Unpatched SimpleHelp RMM to Compromise Billing Software Provider

Related Posts

Capsule Security Unveils AI Protection with M Funding Capsule Security Unveils AI Protection with $7M Funding Security Week News
136 NPM Packages Delivering Infostealers Downloaded 100,000 Times 136 NPM Packages Delivering Infostealers Downloaded 100,000 Times Security Week News
Cisco Introduces Open Source AI Provenance Tool Cisco Introduces Open Source AI Provenance Tool Security Week News
High-Severity Vulnerabilities Patched by Ivanti and Zoom High-Severity Vulnerabilities Patched by Ivanti and Zoom Security Week News
Tiffany Data Breach Impacts Thousands of Customers Tiffany Data Breach Impacts Thousands of Customers Security Week News
Iranian Cyber Group Targets US Organizations Amid Tensions Iranian Cyber Group Targets US Organizations Amid Tensions Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark