Trend Micro has issued safety updates to address many important-seriousness remote code execution and certification bypass weaknesses that affect its top central and closing point encryption (TMEE) policyrver products.
The security seller underlines that he has not seen any evidence of active exploitation in the wild for any of them. However, immediate application of security updates is recommended to address risks.
The trend is a central management server for Micro and Poly Encrypuration Policycard Micro and Poet Encryption (TMEE), which provides full disk encryption and removable media encryption for Windows-based endpoints.
The product is used in the enterprise environment in regulated industries where compliance with data protection standards is important.
With the latest updates, Trend Micro addressed the following high-seriousness and important flaws:
- Cve-2025-49212 , A pre-pronunciation remote code execution defect is caused by the unsafe deserialization in the policyVelleboilisationbinder category. Remote attackers can take advantage of this to execute arbitrary code as a system without the need for login
- Cve-2025-49213 , In a pre-pronunciation remote code execution via Polyservindoservis category, stems from deserialization of incredible data. Attackers can run arbitrary codes as a system with the need for any authentication
- Cve-2025-49216 , Dbappdomain bypasses a authentication defect due to a broken author implementation. Remote attackers can completely bypass the login and perform administrative actions without credentials
- Cve-2025-49217 , A pre-pronunciation RCE vulnerability was triggered by the unprotected deserialization, in the validity method. While it is a bit difficult to exploit, it still allows informal attackers to run the code as a system
It should be noted that the trend of micro Security bulletin The endpoint encryption lists all the four weaknesses as important for the encryption policy, the ZDi advisor considered the CVE-2015-49217 as high-seriousness vulnerability.
Additional issues addressed by the latest version of the endpoint encryption policy, four and high-seriousness weaknesses (eg SQL injections and the increase of privileges).
All weaknesses were addressed in version 6.0.0.4013 (Patch 1 update 6). Flaws affect all versions up to the latest, and there are no mitigations or workarounds for them.
Another Set of problems This trend affects micro -addressed Apex Central, a centralized safety management console is used to monitor, configure and manage several trends micro products and safety agents in one organization.
Both issues are significant-seriousness, pre-formation distance code execution defects:
- Cve-2025-49219 -The pre-pronunciation is due to unsafe deserialization in the GetreportdetailView method of Apex Central in RCE Dosha. Exploitation of this allows uncontrolled attackers to execute the code in terms of network service. (CVSS 9.8)
- Cve-2025-49220 -Convertfromjson method in APEX Central An East-Ek RCE. During deserialization, inappropriate input verification allows the attackers to execute an arbitrary code without authentication. (CVSS 9.8)
The issues were fixed in Patch B7007 for Apex Central 2019 (based on), while they are automatically applied to the backnd to Apex Central as a service.