Trend Micro fixes Critical Vulnerabilities in Apex Central and Encryption Products

Critical CVE Trend Micro Breach

Trend Micro has released urgent security updates to address six critical vulnerabilities affecting its enterprise security solutions, including Apex Central, Endpoint Encryption, and PolicyServer. The flaws could allow remote code execution, arbitrary file deletion, or manipulation of product components. Tracked as CVE-2024-29291 through CVE-2024-29296, these bugs received severity scores as high as 9.8 on the CVSS scale. The vulnerabilities impact both Windows and Linux versions, with the most severe allowing attackers to execute commands on vulnerable systems without authentication. Trend Micro confirmed these issues were found internally and there is no evidence of exploitation in the wild. Customers are strongly advised to apply patches immediately to mitigate risks.

Analysis by Our Experts:


The disclosure of multiple critical vulnerabilities in security software designed to protect enterprises is a brutal paradox. Products like Apex Central and Endpoint Encryption are marketed as fortresses, yet these flaws expose their core as potential backdoors. Trend Micro’s internal discovery of these issues is commendable, but it doesn’t absolve the architectural negligence that allowed unauthenticated execution paths to exist. In 2025, enterprises cannot afford to trust solutions that fail at basic hardening.

Critical infrastructure deserves critical thinking, not critical CVEs.

Read the full article here.

Stay informed with us!

You can subscribe to our monthly cybersecurity newsletter to receive updates about us and the industry

Blog

Check the latest updates on threats, stories, events and analysis.

Copilot Microsoft Breach EchoLeak

Zero-Click EchoLeak Exploit in Microsoft 365 Copilot Highlights AI Data Exfiltration Risks

Misconfigured HMIs US Water Systems

Misconfigured HMIs Expose U.S. Water Systems to Remote Attacks via Web Browsers

Campaign Targets Syrian Arab Army Spyware Attack | ZENDATA

Spyware Campaign Targets Syrian Arab Army with Fake Android Messaging App