Critical Trend Micro Apex One Vulnerabilities (CVE-2025-71210, CVE-2025-71211)

UpGuard Team
UpGuard Team
February 27, 2026

Key Facts: Vulnerability Disclosure

  • Initial Discovery: February 2026
  • Public Advisory Date: February 24, 2026
  • Vulnerability IDs: CVE-2025-71210 and CVE-2025-71211
  • Target System: Trend Micro Apex One (On-Premise)
  • Vulnerability Type: Console Directory Traversal / Remote Code Execution (RCE)
  • Severity: Critical (CVSS Score: 9.8)
  • Status: Patched; Critical Patch Build 14136 released for Windows.

What is the Trend Micro Apex One vulnerability?

On February 24, 2026, Trend Micro (trendmicro.com) issued a formal security bulletin (KA-0022458) regarding multiple security flaws in its Apex One endpoint security platform. The primary issues center on CVE-2025-71210 and CVE-2025-71211, both of which are "directory traversal" vulnerabilities within the Apex One Management Console.

Directory traversal allows an attacker to access files and directories that are stored outside the web root folder. By exploiting this, an unauthenticated remote attacker could upload malicious files and execute arbitrary commands with administrative privileges on the underlying Windows system.

Trend Micro proactively mitigated its SaaS (cloud-based) instances prior to the public disclosure. For organizations managing their own self-hosted (on-premise) environments, a critical patch was released to close these security gaps.

What systems are affected?

The vulnerabilities specifically impact the Trend Micro Apex One management console, which serves as the central hub for managing endpoint security across a corporate network. While the RCE flaws are specific to Windows-based consoles, the broader advisory also addressed several high-severity local privilege escalation (LPE) flaws affecting both Windows and macOS agents.

According to the official advisory, the following products and versions are affected:

Product / Version Status Fixed Version / Build
Apex One 2019 (On-Prem) Affected Critical Patch Build 14136
Apex One as a Service Patched Mitigated in backend (No action required)
Apex One (Mac) Affected ActiveUpdate (SaaS) / Patch 14136

Organizations utilizing Apex One for endpoint detection and response (EDR) or automated threat defense are advised to verify their build number immediately.

Potential impact for organizations

For organizations utilizing Trend Micro Apex One, an unpatched instance of these CVEs presents a "keys to the kingdom" risk. Because the management console oversees security policies for all connected endpoints, a compromise here could lead to:

  • Full System Takeover: Attackers can execute unauthorized commands to disable security features or manipulate the server.
  • Ransomware Deployment: The console can be used as a distribution point to push malicious payloads to all connected workstations and servers.
  • Lateral Movement: Once the central console is compromised, attackers can bridge into other sensitive areas of the corporate network using administrative credentials stored or managed by the platform.

How to secure your environment

  • Review Official Guidance: Consult Trend Micro Knowledge Base article KA-0022458 for detailed technical specifications and download links.
  • Apply Critical Patches: Immediately update on-premise Windows instances to Build 14136 or later.
  • Restrict Console Access: Implement network segmentation or source IP restrictions to ensure the Management Console is not exposed to the public internet.
  • Audit for Compromise: Review system logs from February 2026 for any signs of unusual file uploads or unauthorized directory access within the console’s web folders.

Frequently Asked Questions

What is CVE-2025-71210?

It is a critical directory traversal vulnerability in the Trend Micro Apex One management console. It allows an attacker to bypass security restrictions to upload and run malicious code on the server without needing to log in.

Is my personal data at risk?

This was reported as a technical vulnerability in security software, not a breach of a consumer database. There is currently no evidence that individual user data (such as emails or passwords) has been stolen.

What systems were impacted?

The vulnerability primarily impacts the on-premise versions of Trend Micro Apex One running on Windows. Additionally, six other high-severity flaws (CVE-2025-71212 through CVE-2025-71217) were identified that could allow local users to gain higher privileges on both Windows and macOS systems.

What should I do if my company uses Trend Micro?

Standard employees typically do not need to take action. This update must be performed by IT or Security Administrators. If you manage these systems, ensure your on-premise build is updated to 14136 to mitigate the RCE risk.

How secure is Trend Micro?

Trend Micro provides enterprise cybersecurity solutions including endpoint protection, cloud security, email security, network security, and threat intelligence services. The company operates a platform that offers exposure management, security operations, and AI-powered threat detection and response capabilities.
  • Check icon
    View our free preliminary report on Trend Micro’s security posture
  • Check icon
    13 risk factors, including email security, SSL, DNS health, open ports and common vulnerabilities
www.trendmicro.com
Security ratings
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
UpGuard customer support teamUpGuard customer support teamUpGuard customer support team

Protect your organization

Get in touch or book a free demo.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating