Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18531 | An insecure access control vulnerability in Trend Micro Apex One and Trend Micro Worry-Free Business Security could allow a local attacker to overwrite key memory-mapped files which could then have severe consequences for the security and stability of affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. |
Mon, 06 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Trendmicro apex One Trendmicro worry-free Business Security Trendmicro worry-free Business Security Services |
|
| Weaknesses | NVD-CWE-Other | |
| CPEs | cpe:2.3:a:trendmicro:apex_one:*:*:*:*:on-premises:windows:*:* cpe:2.3:a:trendmicro:apex_one:*:*:*:*:saas:windows:*:* cpe:2.3:a:trendmicro:worry-free_business_security:10.0:sp1:*:*:advanced:*:*:* cpe:2.3:a:trendmicro:worry-free_business_security:10.0:sp1:*:*:standard:*:*:* cpe:2.3:a:trendmicro:worry-free_business_security_services:*:*:*:*:saas:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows Trendmicro apex One Trendmicro worry-free Business Security Trendmicro worry-free Business Security Services |
Tue, 17 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Jun 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An insecure access control vulnerability in Trend Micro Apex One and Trend Micro Worry-Free Business Security could allow a local attacker to overwrite key memory-mapped files which could then have severe consequences for the security and stability of affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | |
| First Time appeared |
Trendmicro
Trendmicro apexone Op Trendmicro apexone Saas |
|
| Weaknesses | CWE-284 | |
| CPEs | cpe:2.3:a:trendmicro:apexone_op:14.0.0.14002:p3:*:*:*:*:*:* cpe:2.3:a:trendmicro:apexone_saas:14.0.0.14492:ga:*:*:*:*:*:* |
|
| Vendors & Products |
Trendmicro
Trendmicro apexone Op Trendmicro apexone Saas |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: trendmicro
Published:
Updated: 2025-06-17T20:25:33.603Z
Reserved: 2025-06-02T17:43:08.723Z
Link: CVE-2025-49154
Updated: 2025-06-17T20:25:27.709Z
Status : Analyzed
Published: 2025-06-17T19:15:33.010
Modified: 2025-10-06T19:11:24.100
Link: CVE-2025-49154
No data.
OpenCVE Enrichment
No data.
EUVD