Source: Ministry of education information & communication security contingency platform
Publication Number | TACERT-ANA-2025061811065959 | Publication Time | 2025/06/18 11:38 |
Incident Type | ANA-Vulnerability Alert | Discovery Time | 2025/06/18 11:38 |
Impact Level | Low | ||
[Subject] [Vulnerability Alert] Two Critical Vulnerabilities Found in Trend Micro Apex Central |
|||
[Content] Forwarded from TWCERTCC-200-202506-00000013 Trend Micro Apex Central is a centralized management platform for Trend Micro's security solutions, including gateway, mail server, file server, and endpoint protection. Two critical vulnerabilities have been disclosed and patched: CVE-2025-49219 (CVSS: 9.8): An unsafe deserialization vulnerability that allows unauthenticated remote attackers to execute arbitrary code on affected Apex Central installations. CVE-2025-49220 (CVSS: 9.8): Another unsafe deserialization vulnerability with the same impact, allowing remote code execution by unauthenticated attackers. Information Sharing Level: WHITE (Information content can be publicly disclosed) |
|||
[Affected Platform] Apex Central 2019 (On-prem) and earlier Apex Central as a Service (SaaS) |
|||
[Recommended Actions] Please visit the official site and apply the patch: https://success.trendmicro.com/en-US/solution/KA-0019926 |
|||
[Reference] https://www.twcert.org.tw/tw/cp-169-10187-e713c-1.html |