CVE-2025-49214
BaseFortify
Publication date: 2025-06-17
Last updated on: 2025-09-08
Assigner: Trend Micro, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| trendmicro | trend_micro_endpoint_encryption | to 6.0.0.4013 (exc) |
| microsoft | windows | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-477 | The code uses deprecated or obsolete functions, which suggests that the code has not been actively reviewed or maintained. |
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an insecure deserialization flaw in the Trend Micro Endpoint Encryption PolicyServer. It occurs in the DeserializeFromBase64String method, where user-supplied data is not properly validated, allowing attackers to deserialize untrusted input. Although it requires authentication, the authentication can be bypassed, enabling remote code execution with SYSTEM-level privileges. [1]
How can this vulnerability impact me? :
If exploited, this vulnerability allows an attacker to execute arbitrary code remotely on the affected system with SYSTEM-level privileges. This can lead to full control over the system, potentially compromising confidentiality, integrity, and availability of data and services. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should apply the update released by Trend Micro that addresses and fixes the issue. Additionally, restrict or monitor access to the Trend Micro Endpoint Encryption PolicyServer to prevent unauthorized or low-privileged code execution, as exploitation requires such access. [1]