9.8
CVE-2025-69258
- EPSS 0.15%
- Veröffentlicht 08.01.2026 12:50:25
- Zuletzt bearbeitet 15.01.2026 19:18:37
- Quelle security@trendmicro.com
- CVE-Watchlists
- Unerledigt
A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected installations.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Trendmicro ≫ Apex Central Version2019 Update- SwEdition-
Trendmicro ≫ Apex Central Version2019 Updatebuild_3752 SwEdition-
Trendmicro ≫ Apex Central Version2019 Updatebuild_5158 SwEdition-
Trendmicro ≫ Apex Central Version2019 Updatebuild_6016 SwEdition-
Trendmicro ≫ Apex Central Version2019 Updatebuild_6288 SwEdition-
Trendmicro ≫ Apex Central Version2019 Updatebuild_6394 SwEdition-
Trendmicro ≫ Apex Central Version2019 Updatebuild_6481 SwEdition-
Trendmicro ≫ Apex Central Version2019 Updatebuild_6511 SwEdition-
Trendmicro ≫ Apex Central Version2019 Updatebuild_6571 SwEdition-
Trendmicro ≫ Apex Central Version2019 Updatebuild_6658 SwEdition-
Trendmicro ≫ Apex Central Version2019 Updatebuild_6660 SwEdition-
Trendmicro ≫ Apex Central Version2019 Updatebuild_6890 SwEdition-
Trendmicro ≫ Apex Central Version2019 Updatebuild_6955 SwEdition-
Trendmicro ≫ Apex Central Version2019 Updatebuild_7007 SwEdition-
Trendmicro ≫ Apex Central Version2019 Updatebuild_7065 SwEdition-
Trendmicro ≫ Apex Central Version2019 Updatebuild_7141 SwEdition-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.15% | 0.361 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@trendmicro.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
CWE-290 Authentication Bypass by Spoofing
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
CWE-346 Origin Validation Error
The product does not properly verify that the source of data or communication is valid.