CVE Alert: CVE-2025-54948 – Trend Micro, Inc. – Trend Micro Apex One

CVE-2025-54948

CRITICALCISA KEVExploitation active

A vulnerability in Trend Micro Apex One (on-premise) management console could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations.

CVSS v3.1 (9.4)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
Trend Micro, Inc.
Product
Trend Micro Apex One
Versions
2019 (14.0) lt 14.0.0.14039
CWE
CWE-78, CWE-78: OS Command Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H
Published
2025-08-05T13:00:19.905Z
Updated
2025-08-18T16:20:23.791Z
cpe:2.3:a:trendmicro:apexone_server:14.0.0.14039:*:*:*:*:*:*:*

AI Summary Analysis

Risk verdict

Critical risk: active exploitation is indicated for this remote, unauthenticated access flaw; treat as priority 1.

Why this matters

The vulnerability allows remote code upload and command execution on the on-prem management console, enabling a foothold with high impact to confidentiality, integrity and availability. With no user interaction or privileges required, an attacker could run commands, move laterally within the network, and disrupt security operations or exfiltrate data.

Most likely attack path

Attack vector is NETWORK with LOW complexity and no privileges or user interaction required, on an unchanged scope. An attacker can trigger OS command injection to upload and execute code on the Apex One server, potentially enabling broad control of the affected host and follow-on access to connected systems.

Who is most exposed

Enterprises deploying Trend Micro Apex One on-premises with exposed or poorly segmented management consoles are most at risk, especially where consoles are reachable from untrusted or broader internal networks.

Detection ideas

  • Unusual or large inbound payload uploads to the management console.
  • Unexpected command execution or child-process events on the Apex One server.
  • Anomalous admin API activity or configuration changes via the console.
  • Sudden spikes in outbound traffic from the console to internal hosts.
  • Logs showing attempted or successful payload execution without valid authentication.

Mitigation and prioritisation

  • Apply patch to fixed version (or latest available) immediately; treat as priority 1 due to KEV/active exploitation.
  • Restrict management console exposure: network segmentation, VPN-only admin access, and allow-list admin IPs.
  • Disable or tightly control external access, and implement strong network monitoring and WAF rules around the console.
  • Harden input validation and logging around console APIs; ensure rapid detection of upload/execute attempts.
  • Verify backups and incident response plans; test recovery procedures to reduce blast radius.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.