- Trend Micro fixed two critical Apex One path traversal flaws (CVE-2025-71210, CVE-2025-71211, both 9.8/10)
- Exploitation requires console access
- SaaS version fixed, on-prem patch Build 14136 released
Trend Micro says it has fixed two critical vulnerabilities that could have allowed threat actors to take over vulnerable underlying systems.
In a security advisory, the company said it fixed a path traversal vulnerability in the Trend Micro Apex One management console, now tracked as CVE-2025-71210, which was given a critical severity score of 9.8/10.
The second bug is of a similar nature – a path traversal bug in the Apex One management console, but since it affects a different executable, it is tracked as CVE-2025-71211. This one also got a critical difficulty rating of 9.8/10.
Patches and defenses
Apex One is an endpoint security platform for enterprise computers, servers and other devices, designed to protect them from malware, ransomware, spyware and other cyber threats. It combines traditional antivirus with modern threat detection technologies like machine learning and behavioral analysis and comes with centralized management and investigation tools.
It is relatively easy to defend against potential attacks. As Trend Micro explained in the guidance, to exploit it, an attacker “must have access to the Trend Micro Apex One Management Console, so customers who have their console’s IP address exposed externally should consider mitigating factors such as source restrictions, if not already in place.”
“While an exploit may require several specific conditions to be met, Trend Micro strongly encourages customers to update to the latest builds as soon as possible,” it warned.
The SaaS Apex One version has already been patched and the company released Critical Patch Build 14136 to on-prem customers. This patch also fixes two additional vulnerabilities in the Windows agent and four in the macOS agent.
At press time, there was no evidence that these flaws were being exploited in the wild, and the US CISA has not yet added them to its catalog of known exploited vulnerabilities (KEV).
Via Bleeping Computer
The best antivirus for all budgets
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews and opinions in your feeds. Be sure to click the Follow button!
And of course you can too follow TechRadar on TikTok for news, reviews, video unboxings, and get regular updates from us on WhatsApp also.



