CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
An insecure deserialization operation in Trend Micro Apex Central below versions 8.0.7007 could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49220 but is in a different method.
Analysis
Pre-authentication remote code execution vulnerability stemming from insecure deserialization in Trend Micro Apex Central versions below 8.0.7007. An unauthenticated attacker can exploit this vulnerability over the network with low complexity to achieve complete system compromise (confidentiality, integrity, and availability). This vulnerability is actively tracked by CISA as a known exploited vulnerability (KEV) with high CVSS 9.8 severity and carries significant real-world risk due to its network-accessible, authentication-bypass nature.
Technical Context
The vulnerability exists in Trend Micro Apex Central's deserialization mechanism (CWE-477: Improperly Implemented Expression Language Injection or CWE-502: Deserialization of Untrusted Data). Deserialization attacks occur when an application reconstructs complex objects from serialized byte streams without proper validation, allowing attackers to instantiate arbitrary classes or trigger unintended code paths. Apex Central, a centralized management platform for Trend Micro endpoint protection, exposes network-accessible deserialization endpoints that accept untrusted input. The vulnerability is distinct from CVE-2025-49220, indicating multiple deserialization gadget chains or methods exist within the same application. This suggests the codebase may contain several vulnerable deserialization patterns, increasing the scope of potential exploitation vectors.
Affected Products
Trend Micro Apex Central: all versions below 8.0.7007. The vulnerability affects the core Apex Central management console used to administer security across enterprise endpoint deployments. Likely CPE identifiers: cpe:2.3:a:trendmicro:apex_central:*:*:*:*:*:*:*:* (versions <8.0.7007). Organizations must inventory all Apex Central deployments and verify version compliance immediately. The centralized nature of Apex Central means a single compromised instance could enable lateral movement and compromise of all managed endpoints, amplifying business impact.
Remediation
Immediate action required: (1) Upgrade Trend Micro Apex Central to version 8.0.7007 or later to patch the deserialization vulnerability. (2) If immediate patching is not possible, implement network-level mitigations: isolate Apex Central management interfaces behind firewalls, restrict network access to Apex Central ports to trusted administrator networks only, and disable external access to Apex Central web services. (3) Monitor Apex Central logs for suspicious deserialization errors, unusual object instantiation, or error stack traces indicating gadget chain exploitation. (4) Review Trend Micro security advisories and official patch release notes for comprehensive remediation guidance and any additional configuration hardening steps. (5) Conduct incident response procedures if Apex Central instances have been internet-exposed or accessible from untrusted networks during the vulnerable period—assume potential compromise and verify endpoint agent integrity across managed assets.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18515