Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Critical flaw in WordPress Modular DS plugin can be actively exploited to gain administrator access

Researchers uncover a re-prompting attack that allows data to be extracted from Microsoft Copilot with a single click

US senators demand answers from X, Meta, Alphabet and more on sexual deepfakes

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Trend Micro Apex Central RCE defect score is 9.8 CVSS for on-premises Windows version
Identity

Trend Micro Apex Central RCE defect score is 9.8 CVSS for on-premises Windows version

userBy userJanuary 9, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

January 9, 2026Ravi LakshmananVulnerabilities / Endpoint Security

Trend Micro Apex Central

Trend Micro has released security updates to address multiple security vulnerabilities affecting the on-premises version of Apex Central for Windows. This contains a critical bug that could lead to arbitrary code execution.

This vulnerability is tracked as CVE-2025-69258 and has a CVSS score of 9.8 out of a maximum of 10.0. This vulnerability is described as a remote code execution case affecting LoadLibraryEX.

“The LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated, remote attacker to load an attacker-controlled DLL into the main executable file, potentially resulting in attacker-supplied code being executed in the SYSTEM context on an affected installation,” the cybersecurity firm said.

Two other flaws have been patched by Trend Micro.

CVE-2025-69259 (CVSS Score: 7.5) – Message Unchecked NULL Return Value vulnerability in Trend Micro Apex Central could allow a remote, unauthenticated attacker to cause a denial of service condition on an affected installation CVE-2025-69260 (CVSS Score: 7.5) – Trend Micro Apex Central out-of-bounds message read vulnerability could allow a remote, unauthenticated attacker to cause a denial of service condition on an affected installation.

cyber security

Tenable, which is credited with identifying and reporting all three flaws in August 2025, said an attacker could exploit CVE-2025-69258 by sending a message “0x0a8d” (“SC_INSTALL_HANDLER_REQUEST”) to the MsgReceiver.exe component, allowing the DLL under their control to is loaded into the binary, which could result in code being executed with elevated privileges.

Similarly, CVE-2025-69259 and CVE-2025-69260 can also be triggered by sending a specially crafted message “0x1b5b” (“SC_CMD_CGI_LOG_REQUEST”) to the MsgReceiver.exe process listening on the default TCP port 20001.

This issue affects Apex Central on-premises versions prior to build 7190. Trend Micro noted that a successful exploit depends on whether the attacker already has physical or remote access to the vulnerable endpoint.

“In addition to applying patches and updated solutions in a timely manner, customers are also encouraged to review remote access to critical systems and ensure policies and perimeter security are up to date,” it added.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleJupiter in Opposition: See the ‘King of Planets’ outshining all the stars in the sky this weekend
Next Article Anritsu and VTT push the boundaries of D-band wireless communications
user
  • Website

Related Posts

Critical flaw in WordPress Modular DS plugin can be actively exploited to gain administrator access

January 15, 2026

Researchers uncover a re-prompting attack that allows data to be extracted from Microsoft Copilot with a single click

January 15, 2026

AI Voice Cloning Exploit, Wi-Fi Kill Switch, PLC Vulns, and 14 More Stories

January 15, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Critical flaw in WordPress Modular DS plugin can be actively exploited to gain administrator access

Researchers uncover a re-prompting attack that allows data to be extracted from Microsoft Copilot with a single click

US senators demand answers from X, Meta, Alphabet and more on sexual deepfakes

Spotify raises subscription prices in the US again

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.