TT-CSIRT – 445.06.08.25 – Critical RCE Vulnerabilities in Trend Micro Apex One (On-Premise) Management Console

TT-CSIRT – 445.06.08.25 – Critical RCE Vulnerabilities in Trend Micro Apex One (On-Premise) Management Console

Please be advised that Trend Micro has identified and issued mitigations for two critical command injection vulnerabilities, CVE-2025-54948 and CVE-2025-54987, affecting the Apex One (On-Premise) Management Console. Both vulnerabilities may allow unauthenticated remote attackers to execute arbitrary commands on affected systems.

Importantly, Trend Micro has observed active exploitation attempts in the wild (ITW) for at least one of these vulnerabilities.

Impact

  • Remote Code Execution (RCE): Vulnerabilities allow unauthenticated, pre-authenticated attackers to execute arbitrary OS commands via the Apex One Management Console.
  • Multiple CPU Architectures Affected: Exploitation affects various system architectures, increasing potential exposure.

Mitigating Factors

  • Exploitation requires access (physical or remote) to the Apex One Management Console.
  • Systems with externally exposed console IPs are at higher risk.
  • It is recommended to:

    • Restrict access to the console via IP allowlisting.
    • Review and harden perimeter firewall and remote access policies.

Affected and Previously Impacted Version(s)

ProductAffected Version(s)PlatformLanguage
Trend Micro Apex One (On-Prem)2019 – Management Server v14039 and belowWindowsEnglish
Trend Micro Apex One as a ServiceN/A*WindowsEnglish
Trend Vision One™ Endpoint SecurityN/A*WindowsEnglish

Solution: Update Firmware

Trend Micro has released the following mitigations to address the issue:

ProductUpdated versionNotesPlatformAvailability
Trend Micro Apex One (on-prem)FixTool_Aug2025 (Short-Term Mitigation)Updated on Aug. 6, 2025**WindowsNow Available
Trend Micro Apex One as a Service*
Trend Vision One™ Endpoint
Security – Standard Endpoint
Protection
July 31, 2025 Implemented Mitigation  WindowsAlready Deployed

Recommendations

  • Immediately apply FixTool_Aug2025 if running affected on-prem versions.
  • Monitor systems for unusual activity.
  • Prepare to deploy the critical patch once available in mid-August.
  • Consider limiting external exposure of the management console.
  • Review and update user credentials and access controls regularly.

References

If you have any queries, comments, or require assistance, please feel free to contact TT-CSIRT via contacts@ttcsirt.gov.tt .