Trend Micro: CISA Warns Trend Micro Apex One Vulnerability Is Being Exploited in Attacks

Trend Micro: CISA Warns Trend Micro Apex One Vulnerability Is Being Exploited in Attacks

CISA Warns of Actively Exploited Trend Micro Apex One Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-34926, a critical vulnerability in Trend Micro Apex One, to its Known Exploited Vulnerabilities (KEV) catalog after confirming active exploitation in real-world attacks. The flaw, disclosed on May 21, 2026, affects on-premise deployments of the widely used endpoint protection platform.

Classified as a directory traversal vulnerability (CWE-23), the flaw allows pre-authenticated local attackers to manipulate server-side files, specifically modifying a key table within the Apex One server. Exploitation enables threat actors to inject malicious code, which is then distributed to connected endpoint agents, effectively turning the security tool into a malware delivery mechanism. While no direct links to ransomware campaigns have been reported, the potential for large-scale network compromise, data exfiltration, or lateral movement makes this a high-risk threat.

Given Apex One’s role in enterprise endpoint protection, attackers could abuse trusted update mechanisms to gain widespread access across affected networks. CISA has mandated federal agencies to remediate the vulnerability by June 4, 2026, and urges all organizations to apply vendor-provided patches or mitigations. If fixes are unavailable, discontinuing use of affected systems is recommended until the risk is addressed.

Security teams are advised to:

  • Apply Trend Micro’s latest updates
  • Restrict local access to Apex One servers
  • Monitor for unauthorized modifications to configuration files or key tables
  • Inspect endpoint agents for signs of malicious code deployment
  • Conduct threat hunting for indicators of compromise (IOCs), such as abnormal agent behavior or unexpected updates

The inclusion of CVE-2026-34926 in CISA’s KEV catalog underscores the urgency of remediation, particularly as attackers increasingly target security infrastructure to maximize impact. Organizations using on-premise Apex One deployments should prioritize mitigation to prevent potential widespread compromise.

Source: https://gbhackers.com/cisa-warns-trend-micro-apex-one-vulnerability/

Trend Micro TPRM report: https://www.rankiteo.com/company/trend-micro

"id": "tre1779438294",
"linkid": "trend-micro",
"type": "Vulnerability",
"date": "5/2026",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'Organizations using on-premise '
                                              'Apex One deployments',
                        'industry': 'Information Technology',
                        'name': 'Trend Micro',
                        'type': 'Cybersecurity Company'}],
 'attack_vector': 'Local Access',
 'data_breach': {'data_exfiltration': 'Potential'},
 'date_publicly_disclosed': '2026-05-21',
 'description': 'The U.S. Cybersecurity and Infrastructure Security Agency '
                '(CISA) has added CVE-2026-34926, a critical vulnerability in '
                'Trend Micro Apex One, to its Known Exploited Vulnerabilities '
                '(KEV) catalog after confirming active exploitation in '
                'real-world attacks. The flaw allows pre-authenticated local '
                'attackers to manipulate server-side files, enabling malicious '
                'code injection distributed to connected endpoint agents, '
                'turning the security tool into a malware delivery mechanism.',
 'impact': {'operational_impact': 'Potential large-scale network compromise, '
                                  'data exfiltration, or lateral movement',
            'systems_affected': 'Trend Micro Apex One on-premise deployments'},
 'investigation_status': 'Ongoing',
 'post_incident_analysis': {'corrective_actions': 'Patch management, access '
                                                  'restrictions, and '
                                                  'monitoring for malicious '
                                                  'activity',
                            'root_causes': 'Directory traversal vulnerability '
                                           '(CVE-2026-34926) in Trend Micro '
                                           'Apex One'},
 'recommendations': ['Apply Trend Micro’s latest updates',
                     'Restrict local access to Apex One servers',
                     'Monitor for unauthorized modifications to configuration '
                     'files or key tables',
                     'Inspect endpoint agents for signs of malicious code '
                     'deployment',
                     'Conduct threat hunting for indicators of compromise '
                     '(IOCs)'],
 'references': [{'source': 'CISA Known Exploited Vulnerabilities Catalog'}],
 'regulatory_compliance': {'regulatory_notifications': 'CISA KEV catalog '
                                                       'addition (mandatory '
                                                       'remediation for '
                                                       'federal agencies by '
                                                       'June 4, 2026)'},
 'response': {'containment_measures': ['Apply Trend Micro’s latest updates',
                                       'Restrict local access to Apex One '
                                       'servers',
                                       'Monitor for unauthorized modifications '
                                       'to configuration files or key tables',
                                       'Inspect endpoint agents for signs of '
                                       'malicious code deployment',
                                       'Conduct threat hunting for indicators '
                                       'of compromise (IOCs)'],
              'remediation_measures': 'Apply vendor-provided patches or '
                                      'mitigations; discontinue use of '
                                      'affected systems if fixes are '
                                      'unavailable'},
 'title': 'CISA Warns of Actively Exploited Trend Micro Apex One Vulnerability',
 'type': 'Vulnerability Exploitation',
 'vulnerability_exploited': 'CVE-2026-34926 (Directory Traversal - CWE-23)'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.