Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution. Please note: an attacker must first obtain Apex One server administration console access in order to exploit this vulnerability.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://success.trendmicro.com/solution/000291528 |
![]() ![]() |
History
Wed, 12 Feb 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:trendmicro:apex_one:-:*:*:*:saas:*:*:* |
Wed, 29 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|

Status: PUBLISHED
Assigner: trendmicro
Published: 2022-09-19T18:01:01.000Z
Updated: 2025-01-29T15:21:31.933Z
Reserved: 2022-09-06T00:00:00.000Z
Link: CVE-2022-40139

Updated: 2024-08-03T12:14:39.635Z

Status : Analyzed
Published: 2022-09-19T18:15:09.960
Modified: 2025-02-12T20:44:10.163
Link: CVE-2022-40139

No data.