top of page
perceptive_background_267k.jpg

Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions

Published:

9 January 2026 at 10:01:00

Alert date:

9 January 2026 at 10:13:05

Source:

thehackernews.com

Click to open the original link from this advisory

Security Tools, Enterprise Applications, Zero-Day Vulnerabilities

Trend Micro has released security updates to address multiple security vulnerabilities in on-premise versions of Apex Central for Windows. The critical vulnerability CVE-2025-69258 has a CVSS score of 9.8 out of 10.0 and could result in arbitrary code execution. This is described as a remote code execution flaw affecting Windows versions of the product. The high CVSS score indicates this is a critical security issue requiring immediate attention.

Technical details

CVE-2025-69258 is a LoadLibraryEX vulnerability that allows an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM. The vulnerability can be exploited by sending a message '0x0a8d' (SC_INSTALL_HANDLER_REQUEST) to the MsgReceiver.exe component. CVE-2025-69259 and CVE-2025-69260 are DoS vulnerabilities triggered by sending specially crafted message '0x1b5b' (SC_CMD_CGI_LOG_REQUEST) to the MsgReceiver.exe process which listens on default TCP port 20001. CVE-2025-69259 involves unchecked NULL return value and CVE-2025-69260 involves out-of-bounds read vulnerability.

Mitigation steps:

Apply timely patches and update to Build 7190 or later. Review remote access to critical systems and ensure policies and perimeter security are up-to-date. Note that successful exploitation requires an attacker to already have physical or remote access to a vulnerable endpoint.

Affected products:

Trend Micro Apex Central on-premise versions for Windows below Build 7190

Related links:

Related CVE's:

Related threat actors:

IOC's:

Message '0x0a8d' (SC_INSTALL_HANDLER_REQUEST) sent to MsgReceiver.exe, Message '0x1b5b' (SC_CMD_CGI_LOG_REQUEST) sent to MsgReceiver.exe, TCP port 20001 - default listening port for MsgReceiver.exe process

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page