EUVD-2025-18560

| CVE-2025-49218 HIGH
2025-06-17 [email protected]
7.7
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 22:15 euvd
EUVD-2025-18560
Analysis Generated
Mar 14, 2026 - 22:15 vuln.today
CVE Published
Jun 17, 2025 - 21:15 nvd
HIGH 7.7

Description

A post-auth SQL injection vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to escalate privileges on affected installations. This is similar to, but not identical to CVE-2025-49215. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.

Analysis

Post-authentication SQL injection vulnerability in Trend Micro Endpoint Encryption PolicyServer that allows low-privileged authenticated users to escalate privileges through SQL injection attacks. The vulnerability has a CVSS score of 7.7 (high severity) with significant impact on confidentiality, integrity, and availability. While this is a post-auth vulnerability requiring initial low-privileged code execution, successful exploitation enables privilege escalation, making it a critical concern for organizations running affected PolicyServer instances.

Technical Context

This vulnerability exploits improper input validation in SQL query construction within Trend Micro Endpoint Encryption PolicyServer (CWE-89: Improper Neutralization of Special Elements used in an SQL Command). The PolicyServer component, which manages encryption policies across endpoints, fails to properly sanitize user-supplied input before incorporating it into SQL queries. Unlike pre-authentication SQL injection, this variant requires the attacker to already have low-privileged access to the system, reducing the attack surface but increasing post-compromise risk. The vulnerability is similar to but distinct from CVE-2025-49215, suggesting a class of related SQL injection issues in the same product line that may indicate systemic input validation weaknesses in the PolicyServer codebase.

Affected Products

Trend Micro Endpoint Encryption PolicyServer (specific vulnerable versions not explicitly stated in provided data; vendor advisory consultation required for precise version ranges). The product is the centralized policy management component for Trend Micro Endpoint Encryption, used to distribute and manage encryption policies across protected endpoints. Based on CVE-2025-49215 being related, both CVE-2025-49215 and CVE-2025-49218 likely affect overlapping version ranges of PolicyServer. Users should consult the official Trend Micro security advisory for exact affected versions and build numbers. CPE data would typically follow pattern: cpe:2.3:a:trendmicro:endpoint_encryption_policyserver:*:*:*:*:*:*:*:*

Remediation

1. Apply vendor-supplied security patches from Trend Micro immediately upon availability. Check Trend Micro's official security advisory portal for CVE-2025-49218 patch details and affected version numbers. 2. Implement access controls limiting local system access to PolicyServer to authorized administrators only. 3. Restrict PolicyServer database access to authenticated, authorized users through role-based access control (RBAC). 4. Monitor PolicyServer logs for suspicious SQL patterns or unusual database query activity that may indicate exploitation attempts. 5. Implement input validation and parameterized/prepared SQL statements in any custom scripts or integrations with PolicyServer. 6. Consider network segmentation to restrict PolicyServer access to trusted administrative networks only. 7. Maintain current backups of PolicyServer database and configurations to enable rapid recovery if compromise occurs.

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

EUVD-2025-18560 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy