Trend Micro warns of critical Apex Central RCE vulnerability
好的,我现在需要帮用户总结一篇文章,控制在100个字以内,而且不需要特定的开头。首先,我得仔细阅读文章内容,抓住关键点。 文章主要讲的是Trend Micro修补了一个关键的安全漏洞,这个漏洞存在于Apex Central(本地部署版本)中。攻击者可以利用这个漏洞执行任意代码,并获得SYSTEM权限。漏洞的编号是CVE-2025-69258,允许无权限的攻击者通过注入恶意DLL来远程执行代码,而且攻击复杂度低,不需要用户交互。 Trend Micro已经发布了补丁Critical Patch Build 7190,并且还修复了另外两个拒绝服务漏洞。此外,三年前他们也修补过类似的漏洞,并警告客户它被积极利用。 接下来,我需要把这些信息浓缩到100字以内。重点包括:公司名称、漏洞名称、影响、攻击方式、补丁信息以及之前的类似事件。 可能会这样组织句子:Trend Micro修补了Apex Central本地版的严重漏洞CVE-2025-69258,允许无权限攻击者注入恶意DLL以SYSTEM权限远程执行代码。该漏洞无需用户交互且攻击复杂度低。公司已发布补丁Build 7190修复此问题及其他两个拒绝服务漏洞。此前曾修补过类似漏洞并警告其被积极利用。 检查一下字数是否在限制内,并确保所有关键点都被涵盖。 </think> Trend Micro修补了Apex Central本地版的严重漏洞CVE-2025-69258,允许无权限攻击者注入恶意DLL以SYSTEM权限远程执行代码。该漏洞无需用户交互且攻击复杂度低。公司已发布补丁Build 7190修复此问题及其他两个拒绝服务漏洞。此前曾修补过类似漏洞并警告其被积极利用。 2026-1-9 10:45:18 Author: www.bleepingcomputer.com(查看原文) 阅读量:25 收藏

Trend Micro

Japanese cybersecurity software firm Trend Micro has patched a critical security flaw in Apex Central (on-premise) that could allow attackers to execute arbitrary code with SYSTEM privileges.

Apex Central is a web-based management console that helps admins manage multiple Trend Micro products and services (including antivirus, content security, and threat detection) and deploy components like antivirus pattern files, scan engines, and antispam rules from a single interface.

Tracked as CVE-2025-69258, the vulnerability enables threat actors without privileges on the targeted system to gain remote code execution by injecting malicious DLLs in low-complexity attacks that don't require user interaction.

Wiz

"A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected installations," Trend Micro said in a security advisory published this week.

As explained by cybersecurity company Tenable, which reported the flaw and shared technical details and proof-of-concept code, unauthenticated remote attackers can send a specially crafted message to the MsgReceiver.exe process listening on TCP port 20001, "leading to execution of attacker-supplied code under the security context of SYSTEM."

While there are mitigating factors, like vulnerable systems being exposed to Internet attacks, Trend Micro urged customers to patch their systems as soon as possible.

"In addition to timely application of patches and updated solutions, customers are also advised to review remote access to critical systems and ensure policies and perimeter security is up-to-date," Trend Micro added.

"However, even though an exploit may require several specific conditions to be met, Trend Micro strongly encourages customers to update to the latest builds as soon as possible."

To address this vulnerability, Trend Micro has released Critical Patch Build 7190, which also fixes two denial-of-service flaws (CVE-2025-69259 and CVE-2025-69260) that can be exploited by unauthenticated attackers.

The company patched another remote code execution Apex Central vulnerability (CVE-2022-26871) three years ago, warning customers that it was actively exploited in the wild.

Wiz

7 Security Best Practices for MCP

As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

This free cheat sheet outlines 7 best practices you can start using today.


文章来源: https://www.bleepingcomputer.com/news/security/trend-micro-fixes-critical-rce-flaw-in-apex-central-console/
如有侵权请联系:admin#unsafe.sh