Multiple Trend Micro Products Zero-Day Vulnerabilities
June 12, 2025Akira Ransomware – Active IOCs
June 12, 2025Multiple Trend Micro Products Zero-Day Vulnerabilities
June 12, 2025Akira Ransomware – Active IOCs
June 12, 2025Severity
High
Analysis Summary
CVE-2025-49218 CVSS:8.8
This vulnerability allows remote malicious users to escalate privileges on affected installations of Trend Micro Endpoint Encryption. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the implementation of the ProcessWhereClause method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.
CVE-2025-49217 CVSS:8.1
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Endpoint Encryption. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the ValidateToken method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
CVE-2025-49216 CVSS:9.8
This vulnerability allows remote attackers to bypass authentication on affected installations of Trend Micro Endpoint Encryption. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DbAppDomain service. The issue results from an improper implementation of an authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system.
CVE-2025-49215 CVSS:8.8
This vulnerability allows remote attackers to escalate privileges on affected installations of Trend Micro Endpoint Encryption. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the implementation of the GetGroupFilteredUsers method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.
CVE-2025-49213 CVSS:9.8
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Endpoint Encryption. Authentication is not required to exploit this vulnerability. The specific flaw exists within the PolicyServerWindowsService class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
CVE-2025-49212 CVSS:9.8
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Endpoint Encryption. Authentication is not required to exploit this vulnerability. The specific flaw exists within the PolicyValueTableSerializationBinder class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
CVE-2025-49211 CVSS:8.8
This vulnerability allows remote attackers to escalate privileges on affected installations of Trend Micro Endpoint Encryption. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the implementation of the BuildEnterpriseSearchString method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.
Impact
- Security Bypass
- Code Execution
- Privilege Escalation
Indicators of Compromise
CVE
CVE-2025-49218
CVE-2025-49217
CVE-2025-49216
CVE-2025-49215
CVE-2025-49213
CVE-2025-49212
CVE-2025-49211
Affected Vendors
Affected Products
- Trend Micro Endpoint Encryption (TMEE) PolicyServer - 6.0.0.4013
Remediation
Refer to Trend Micro Security Advisory for patch, upgrade, or suggested workaround information.