PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-34927 Trend Micro, Inc. CVE debrief

CVE-2026-34927 describes an origin validation weakness in the Apex One/SEP agent that could let a local attacker elevate privileges on affected installations. Exploitation requires the attacker to already have the ability to run low-privileged code on the target system, which keeps the issue local but still serious because the reported impact is high on confidentiality, integrity, and availability.

Vendor
Trend Micro, Inc.
Product
TrendAI Apex One
CVSS
HIGH 7.8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-21
Original CVE updated
2026-05-21
Advisory published
2026-05-21
Advisory updated
2026-05-21

Who should care

Endpoint security teams, Windows administrators, and organizations running Apex One/SEP agent deployments should prioritize this issue, especially where untrusted local code execution is a concern.

Technical summary

NVD records this as a local vulnerability with CVSS 3.1 vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H and lists CWE-346 as the weakness type from the vendor submission. The vulnerability is described as an origin validation problem in the Apex One/SEP agent that could allow privilege escalation after an attacker gains low-privilege code execution on the host.

Defensive priority

High

Recommended defensive actions

  • Review Trend Micro advisory KA-0023430 and apply the vendor-recommended fix or update path as soon as possible.
  • Inventory systems running the affected Apex One/SEP agent and confirm which endpoints are exposed to local code execution risk.
  • Reduce opportunities for low-privilege code execution on managed endpoints by enforcing application control and least privilege.
  • Monitor affected systems for unexpected privilege changes or suspicious local process activity.
  • Track remediation status centrally and verify that all endpoints have been updated after deployment.

Evidence notes

The debrief is based on the NVD record for CVE-2026-34927, which was published on 2026-05-21 and lists a Trend Micro reference URL (KA-0023430). NVD shows vulnStatus as Received, the CVSS vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, and CWE-346 as supplied by [email protected]. The supplied corpus does not include affected version ranges or patch identifiers.

Official resources

Publicly disclosed on 2026-05-21 through the CVE/NVD record, with a Trend Micro advisory reference available on the same date. No KEV listing is present in the supplied timeline fields.