CVE-2025-49214
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-17

Last updated on: 2025-09-08

Assigner: Trend Micro, Inc.

Description
An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a post-authentication remote code execution on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-17
Last Modified
2025-09-08
Generated
2026-05-07
AI Q&A
2025-06-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
trendmicro trend_micro_endpoint_encryption to 6.0.0.4013 (exc)
microsoft windows *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-477 The code uses deprecated or obsolete functions, which suggests that the code has not been actively reviewed or maintained.
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an insecure deserialization flaw in the Trend Micro Endpoint Encryption PolicyServer. It occurs in the DeserializeFromBase64String method, where user-supplied data is not properly validated, allowing attackers to deserialize untrusted input. Although it requires authentication, the authentication can be bypassed, enabling remote code execution with SYSTEM-level privileges. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability allows an attacker to execute arbitrary code remotely on the affected system with SYSTEM-level privileges. This can lead to full control over the system, potentially compromising confidentiality, integrity, and availability of data and services. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should apply the update released by Trend Micro that addresses and fixes the issue. Additionally, restrict or monitor access to the Trend Micro Endpoint Encryption PolicyServer to prevent unauthorized or low-privileged code execution, as exploitation requires such access. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart