CVE-2025-49220
BaseFortify
Publication date: 2025-06-17
Last updated on: 2025-09-08
Assigner: Trend Micro, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| trendmicro | apex_central | 2019 |
| trendmicro | apex_central | 2019 |
| trendmicro | apex_central | 2019 |
| trendmicro | apex_central | 2019 |
| trendmicro | apex_central | 2019 |
| trendmicro | apex_central | 2019 |
| trendmicro | apex_central | 2019 |
| trendmicro | apex_central | 2019 |
| trendmicro | apex_central | 2019 |
| trendmicro | apex_central | 2019 |
| trendmicro | apex_central | 2019 |
| trendmicro | apex_central | 2019 |
| trendmicro | apex_central | 2019 |
| microsoft | windows | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-477 | The code uses deprecated or obsolete functions, which suggests that the code has not been actively reviewed or maintained. |
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-49220 is a critical vulnerability in Trend Micro Apex Central (versions below 8.0.7007) caused by insecure deserialization in the ConvertFromJson method. This method improperly processes user-supplied data without proper validation, allowing remote attackers to execute arbitrary code on the affected system without authentication. [1]
How can this vulnerability impact me? :
This vulnerability can lead to remote code execution by an attacker without requiring authentication, potentially allowing them to run arbitrary code with NETWORK SERVICE privileges. This can result in full compromise of the affected system, including data theft, system manipulation, or disruption of services. [1]
What immediate steps should I take to mitigate this vulnerability?
Apply the update released by Trend Micro to fix the vulnerability in Apex Central. Ensure your installation is upgraded to version 8.0.7007 or later to address the insecure deserialization flaw and prevent remote code execution. [1]