PatchSiren

Trend Micro, Inc. CVE debriefs

These pages are published after PatchSiren validates generated defensive summaries against stored public CVE and source evidence.

HIGH Trend Micro, Inc. CVE published 2026-05-21

CVE-2026-34929

CVE-2026-34929 is a high-severity local privilege-escalation issue in an Apex One/SEP agent component. According to the CVE description, a local attacker who can already execute low-privileged code on the target system may be able to elevate privileges by abusing an origin validation weakness in a specific inter-process communication path. NVD records the issue as CVSS 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H [truncated]

HIGH Trend Micro, Inc. CVE published 2026-05-21

CVE-2026-34928

CVE-2026-34928 is a high-severity local privilege escalation vulnerability tied to origin validation in an Apex One/SEP agent communication path. According to the NVD summary, a local attacker who first achieves low-privileged code execution on the target system may be able to escalate privileges on affected installations. The issue is described as similar to CVE-2026-34927, but in a different named pipe [truncated]

HIGH Trend Micro, Inc. CVE published 2026-05-21

CVE-2026-34927

CVE-2026-34927 describes an origin validation weakness in the Apex One/SEP agent that could let a local attacker elevate privileges on affected installations. Exploitation requires the attacker to already have the ability to run low-privileged code on the target system, which keeps the issue local but still serious because the reported impact is high on confidentiality, integrity, and availability.

HIGH Trend Micro, Inc. CVE published 2026-05-21

CVE-2025-71217

CVE-2025-71217 describes an origin validation error in the Trend Micro Apex One (mac) agent self-protection mechanism. A local attacker who can already run low-privileged code on the target system could use the flaw to escalate privileges. The provided description also notes that Trend Micro had already addressed the issue through ActiveUpdate/SaaS updates in mid to late 2025.

HIGH Trend Micro, Inc. CVE published 2026-05-21

CVE-2025-71216

CVE-2025-71216 describes a time-of-check time-of-use (TOCTOU) issue in the Trend Micro Apex One (mac) agent cache mechanism that could let a local attacker escalate privileges. The vendor note says an attacker must already have the ability to execute low-privileged code on the target system. Trend Micro also states the issue had already been addressed through ActiveUpdate/SaaS updates in mid to late 2025, [truncated]

HIGH Trend Micro, Inc. CVE published 2026-05-21

CVE-2025-71215

CVE-2025-71215 describes a time-of-check time-of-use (TOCTOU) vulnerability in Trend Micro Apex One (mac) agent iCore service signature verification. An attacker would first need the ability to run low-privileged code on the target system, after which the flaw could allow privilege escalation on affected installations. Trend Micro’s note in the CVE record says the issue had already been addressed through [truncated]

HIGH Trend Micro, Inc. CVE published 2026-05-21

CVE-2025-71214

CVE-2025-71214 describes an origin validation error in the Trend Micro Apex One (mac) agent iCore service that could allow a local attacker to escalate privileges on affected installations. The attacker must already be able to execute low-privileged code on the target system. According to the vendor note supplied with the CVE reference, the issue was already addressed through ActiveUpdate/SaaS updates in [truncated]

CRITICAL Trend Micro, Inc. CVE published 2026-05-21

CVE-2025-71211

CVE-2025-71211 is a critical Trend Micro Apex One management-console vulnerability disclosed through responsible disclosure via the Zero Day Initiative. Trend Micro says SaaS versions were already mitigated and require no customer action, but on-prem or otherwise exposed console deployments should be treated as high priority, especially where the console is reachable beyond trusted networks.

CRITICAL Trend Micro, Inc. CVE published 2026-05-21

CVE-2025-71210

CVE-2025-71210 affects the Trend Micro Apex One management console. According to the supplied vendor description, a remote attacker who can access the console could upload malicious code and execute commands on affected installations. The vendor also states that SaaS versions have already been mitigated and that no customer action is required for those deployments. For self-managed environments, the main [truncated]