Latest Trend Micro Apex One vulnerabilities #

Trend Micro has disclosed two OS command injection vulnerabilities in certain versions of its Apex One Management Console (on-premises). The vulnerabilities are the result of improper validation of a user-supplied string before it is used to execute a system call. Successful exploitation may allow a remote, unauthenticated adversary to upload malicious code and execute commands in the context of IUSR on affected installations. The vulnerabilities have been designated CVE-2025-54987 and CVE-2025-54948 and have been rated critical with a CVSS score of 9.4. Note that CVE-2025-54987 describes the same vulnerability as CVE-2025-54948 but targets a different CPU architecture.

There is evidence that these vulnerabilities are being actively exploited in the wild.

    The following versions are affected

    • Apex One (on-premise) versions 2019 (14.0) prior to 14.0.0.14039

    What is the impact? #

    Successful exploitation of these vulnerabilities would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.

    Are updates or workarounds available? #

    Users are encouraged to update to the latest version as quickly as possible:

    • Apex One (on-premise) upgrade to version 14.0.0.14039 or later

    How to find potentially vulnerable systems with runZero #

    From the Service inventory, use the following query to locate potentially vulnerable assets:

    _asset.protocol:http AND protocol:http AND has:html.body AND html.body:"officescan/console/html/cgi/cgiChkMasterPwd.exe"

    Written by Matthew Kienow

    Matthew Kienow is a software engineer and security researcher. Matthew previously worked on the Recog recognition framework, AttackerKB as well as Metasploit's MSF 5 APIs. He has also designed, built, and successfully deployed many secure software solutions; however, often he enjoys breaking them instead. He has presented his research at various security conferences including DerbyCon, Hack In Paris, and CarolinaCon. His research has been cited by CSO, Threatpost and SC Magazine.

    More about Matthew Kienow
    Subscribe Now

    Get the latest news and expert insights delivered in your inbox.

    Welcome to the club! Your subscription to our newsletter is successful.

    See Results in Minutes

    See & secure your total attack surface. Even the unknowns & unmanageable.