Rewterz
Multiple Trend Micro Products Zero-Day Vulnerabilities
June 12, 2025
Rewterz
Akira Ransomware – Active IOCs
June 12, 2025

Multiple Trend Micro Endpoint Encryption Zero-Day Vulnerabilities

Severity

High

Analysis Summary

CVE-2025-49218 CVSS:8.8

This vulnerability allows remote malicious users to escalate privileges on affected installations of Trend Micro Endpoint Encryption. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the implementation of the ProcessWhereClause method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.

CVE-2025-49217 CVSS:8.1

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Endpoint Encryption. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the ValidateToken method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.

CVE-2025-49216 CVSS:9.8

This vulnerability allows remote attackers to bypass authentication on affected installations of Trend Micro Endpoint Encryption. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DbAppDomain service. The issue results from an improper implementation of an authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system.

CVE-2025-49215 CVSS:8.8

This vulnerability allows remote attackers to escalate privileges on affected installations of Trend Micro Endpoint Encryption. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the implementation of the GetGroupFilteredUsers method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.

CVE-2025-49213 CVSS:9.8

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Endpoint Encryption. Authentication is not required to exploit this vulnerability. The specific flaw exists within the PolicyServerWindowsService class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.

CVE-2025-49212 CVSS:9.8

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Endpoint Encryption. Authentication is not required to exploit this vulnerability. The specific flaw exists within the PolicyValueTableSerializationBinder class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.

CVE-2025-49211 CVSS:8.8

This vulnerability allows remote attackers to escalate privileges on affected installations of Trend Micro Endpoint Encryption. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the implementation of the BuildEnterpriseSearchString method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.

Impact

  • Security Bypass
  • Code Execution
  • Privilege Escalation

Indicators of Compromise

CVE

  • CVE-2025-49218

  • CVE-2025-49217

  • CVE-2025-49216

  • CVE-2025-49215

  • CVE-2025-49213

  • CVE-2025-49212

  • CVE-2025-49211

Affected Vendors

Trend Micro

Affected Products

  • Trend Micro Endpoint Encryption (TMEE) PolicyServer - 6.0.0.4013

Remediation

Refer to Trend Micro Security Advisory for patch, upgrade, or suggested workaround information.

Trend Micro Security Advisory