Trend Micro Apex One Critical Vulnerabilities (CVE-2025-54987 & 54948)
On 6 August 2025, Trend Micro confirmed two critical vulnerabilities in their Apex One endpoint security platform: CVE-2025-54987 and CVE-2025-54948. Both flaws reside in the on-premise management console and are rated 9.4 on the CVSS scale. Attackers can remotely upload malicious code and execute commands on the server without any prior authentication. CVE-2025-54987 targets a different CPU architecture and stems from an OS command injection issue, while CVE-2025-54948 results from insufficient input validation in the backend. Trend Micro observed at least one exploitation attempt in the wild.
These vulnerabilities give threat actors a route to total endpoint takeover, which is why quick action is key. An unauthenticated attacker could deploy ransomware, pivot deeper into your network, or exfiltrate sensitive data. Trend Micro released a mitigation tool that temporarily disables the Remote Install Agent function until a full patch is released. Organisations should also review remote access to their console and restrict IP exposure. Here’s a quick rundown of what you should do:
- Apply the fix tool immediately: Use Trend Micro’s interim mitigation tool to neutralize the vulnerabilities while waiting for the official patch. Make sure to test it in a staging environment before deploying.
- Restrict console exposure: Limit the management console to trusted IP ranges and disable remote access from the internet. Attackers exploit misconfigurations and open ports to access your console.
- Harden your infrastructure: Implement network segmentation around management servers, enforce least privilege and multi-factor authentication, and ensure OS and dependent packages are up to date. Even a small misconfiguration can lead to command execution.
- Monitor logs for suspicious activity: Look for unusual user creation, script execution, or error messages that could indicate exploitation attempts. Maintain an incident response plan to quickly contain any breach.
- Train your teams: Security awareness isn’t just about phishing. Administrators need to understand the risk of outdated consoles and incomplete maintennance. Terra System Labs offers custom training to help your staff recognise suspicious events and respond effectively.
Trend Micro’s long-term patch is expected later this year. In the meantime, regular auditing and vulnerability scanning can identify missteps before attackers do. Terra System Labs’ vulnerability assessment and penetration testing services simulate real-world attacks to expose weaknesses in your endpoint management. We’ll help you remediate issues, review your network architecture, and ensure that such vulnerabilities don’t slip through the cracks again.
By staying vigilant, patching promptly, and partnering with experts like Terra System Labs, you can reduce the likelihood of being exploited by these critical Apex One vulnerbilities and keep your business safe in 2025.
Recent Posts


























