Article Details

Scrape Timestamp (UTC): 2026-01-09 10:08:41.996

Source: https://thehackernews.com/2026/01/trend-micro-apex-central-rce-flaw.html

Original Article Text

Click to Toggle View

Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions. Trend Micro has released security updates to address multiple security vulnerabilities impacting on-premise versions of Apex Central for Windows, including a critical bug that could result in arbitrary code execution. The vulnerability, tracked as CVE-2025-69258, carries a CVSS score of 9.8 out of a maximum of 10.0. The vulnerability has been described as a case of remote code execution affecting LoadLibraryEX. "A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected installations," the cybersecurity company said. Also patched by Trend Micro are two other flaws - Tenable, which is credited with identifying and reporting all three flaws in August 2025, said an attacker can exploit CVE-2025-69258 by sending a message "0x0a8d" ("SC_INSTALL_HANDLER_REQUEST") to the MsgReceiver.exe component, causing a DLL under their control to be loaded into the binary, resulting in code execution with elevated privileges. Similarly, CVE-2025-69259 and CVE-2025-69260 can also be triggered by sending a specially crafted message "0x1b5b" ("SC_CMD_CGI_LOG_REQUEST") to the MsgReceiver.exe process, which listens on the default TCP port 20001. The issues impact Apex Central on-premise versions below Build 7190. Trend Micro noted that successful exploitation hinges on an attacker already having physical or remote access to a vulnerable endpoint. "In addition to timely application of patches and updated solutions, customers are also advised to review remote access to critical systems and ensure policies and perimeter security are up-to-date," it added.

Daily Brief Summary

VULNERABILITIES // Critical RCE Vulnerability in Trend Micro Apex Central Patched

Trend Micro released patches for critical vulnerabilities in Apex Central for Windows, including a remote code execution flaw rated 9.8 CVSS.

The primary flaw, CVE-2025-69258, allows unauthenticated attackers to execute arbitrary code by exploiting the LoadLibraryEX function.

Attackers can exploit this by sending specific messages to the MsgReceiver.exe component, potentially gaining SYSTEM-level access.

Additional vulnerabilities, CVE-2025-69259 and CVE-2025-69260, involve similar exploitation techniques via crafted messages to the same process.

The vulnerabilities affect on-premise versions of Apex Central below Build 7190, necessitating urgent patch application.

Successful exploitation requires prior physical or remote access to the targeted system, emphasizing the need for robust access controls.

Trend Micro advises reviewing remote access policies and updating perimeter security to mitigate potential exploitation risks.