Trend Micro has released an urgent out-of-cycle security update for its Apex One endpoint protection solution, addressing five critical vulnerabilities (CVE-2025-49154 to CVE-2025-49158). These flaws, affecting both on-premise (2019) and cloud-based Windows platforms, pose significant risks, including remote code execution (RCE) and local privilege escalation (LPE). The most severe, CVE-2025-49155 (CVSS 8.8), resides in the Data Loss Prevention module and could allow remote attackers to execute arbitrary code if users interact with malicious files or compromised websites. Another critical vulnerability, CVE-2025-49154 (CVSS 8.7), stems from improper access control, potentially enabling local attackers to overwrite memory-mapped files. The remaining vulnerabilities, CVE-2025-49156, CVE-2025-49157, and CVE-2025-49158, are privilege escalation flaws. The first two are related to link-following issues within the scan and damage cleanup engines, while the last affects the security agent uninstallation process. These vulnerabilities collectively expand the potential attack surface, particularly for organizations with widely distributed endpoints. Even though some attacks require user interaction or local access, the presence of a remotely exploitable RCE vulnerability underscores the immediate need for organizations to apply these patches. Organizations are strongly advised to prioritize the implementation of these new patches. Specifically, Apex One 2019 users should upgrade to SP1 CP Build 14002, and Apex One as a Service users should update to Security Agent Version 14.0.14492. Beyond patching, administrators should thoroughly review endpoint configurations, enforce the principle of least privilege, and actively monitor system logs for any signs of exploitation. Regular vulnerability management practices and ongoing employee awareness training are crucial steps to mitigate the risks of privilege escalation and RCE attacks.
The Apache Software Foundation has issued a new security advisory detailing three vulnerabilities affecting Apache Kylin, a high-concurrency OLAP engine used widely in big data ana...
NVIDIA has released a critical security update to address several vulnerabilities discovered in its NVIDIA App software for Windows. These flaws, if exploited, could allow local at...
The security of the open-source supply chain was tested again when researchers from JFrog discovered a malicious PyPI package called SoopSocks (XRAY-725599). Ostensibly advertised ...