🔐 CVE Alert

CVE-2025-71210

CRITICAL 9.8
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations. Please note: although this vulnerability carries a technical critical CVSS rating, this was reported via responsible disclosure via a researcher through the Zero Day Initiative. The SaaS versions of the product have already been mitigated and no customer action required. For this particular vulnerability, an attacker must have access to the Trend Micro Apex One Management Console, so customers that have their console�s IP address exposed externally should consider mitigating factors such as source restrictions if not already applied.

Vendor trend micro, inc.
Product trendai apex one
Published May 21, 2026
Stay Ahead of the Next One

Get instant alerts for trend micro, inc. trendai apex one

Be the first to know when new critical vulnerabilities affecting trend micro, inc. trendai apex one are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Trend Micro, Inc. / TrendAI Apex One
2019 (14.0) < 14.0.0.14136
Trend Micro, Inc. / TrendAI Apex One as a Service
SaaS < 14.0.20315

References

NVD ↗ CVE.org ↗ EPSS Data ↗
success.trendmicro.com: https://success.trendmicro.com/en-US/solution/KA-0022458 zerodayinitiative.com: https://www.zerodayinitiative.com/advisories/ZDI-26-136/