[Japanese]

JVNDB-2026-016802

Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises (May 2026)

Overview

Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises contain multiple vulnerabilities listed below.
  • Relative path traversal in Apex One server (CWE-23) - CVE-2026-34926
    • The only product that could be vulnerable to this exploit is TrendAI Apex One (On Premise).
  • Origin validation error in Security Agent (CWE-346) - CVE-2026-34927,CVE-2026-34928,CVE-2026-34929,CVE-2026-34930,CVE-2026-45206,CVE-2026-45207
  • Time-of-check time-of-use (TOCTOU) race condition in Security Agent (CWE-367) - CVE-2026-45208
Trend Micro Incorporated has reported that attacks exploiting CVE-2026-34926 have been observed in the wild.

Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 6.7 (Medium) [Other]
  • Attack Vector: Local
  • Attack Complexity: High
  • Privileges Required: High
  • User Interaction: None
  • Scope: Changed
  • Confidentiality Impact: High
  • Integrity Impact: Low
  • Availability Impact: Low
The above CVSS base scores have been assigned for CVE-2026-34926


CVSS v3 Severity
Base Metrics:7.8 (High) [Other]
  • Access Vector: Local
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact(C): High
  • Integrity Impact(I): High
  • Availability Impact(A): High
The above CVSS base scores have been assigned for CVE-2026-34927,CVE-2026-34928,CVE-2026-34929,CVE-2026-34930,CVE-2026-45206,CVE-2026-45207


CVSS v3 Severity
Base Metrics:7.8 (High) [Other]
  • Access Vector: Local
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact(C): High
  • Integrity Impact(I): High
  • Availability Impact(A): High
The above CVSS base scores have been assigned for CVE-2026-45208
Affected Products


Trend Micro, Inc.
  • Trend Micro Apex One as a Service Server: before the maintenance on April 2026
  • Trend Micro Apex One as a Service Security Agent: Agent Build prior to 14.0.20731
  • TrendAI Apex One (On Premise) Server: Build prior to 17079
  • TrendAI Apex One (On Premise) Security Agent: Agent Build prior to 14.0.17079
  • TrendAI Vision One Endpoint Security - Standard Endpoint Protection Server: before the maintenance on April 2026
  • TrendAI Vision One Endpoint Security - Standard Endpoint Protection Security Agent: Agent Build prior to 14.0.20731

Impact

  • An attacker who can access Apex One server with administrator privileges may be able to tamper with arbitrary files on the server, potentially allowing crafted code to be distributed to the security agent (CVE-2026-34926)
  • An attacker who can access Security Agent may escalate privileges (CVE-2026-34927, CVE-2026-34928, CVE-2026-34929, CVE-2026-34930, CVE-2026-45206, CVE-2026-45207, CVE-2026-45208)
Solution

[Apply the Patch]
Apply the appropriate patch according to the information provided by the developer.
The developer has released the patchs listed below that address the vulnerabilities.
  • TrendAI Apex One (On Premise)
    • Server: Service Pack 1 Critical Patch B18012
    • Security Agent: Agent Build 14.0.18012
  • Trend Micro Apex One as a Service
    • Server: fixed with April 2026 maintenance
    • Security Agent: Agent Build 14.0.20731
  • TrendAI Vision One Endpoint Security - Standard Endpoint Protection
    • Server: fixed with April 2026 maintenance
    • Security Agent: Agent Build 14.0.20731
Vendor Information

Trend Micro, Inc.
CWE (What is CWE?)

  1. Relative Path Traversal(CWE-23) [Other]
  2. Origin Validation Error(CWE-346) [Other]
  3. Time-of-check Time-of-use (TOCTOU) Race Condition(CWE-367) [Other]
CVE (What is CVE?)

  1. CVE-2026-34926
  2. CVE-2026-34927
  3. CVE-2026-34928
  4. CVE-2026-34929
  5. CVE-2026-34930
  6. CVE-2026-45206
  7. CVE-2026-45207
  8. CVE-2026-45208
References

  1. JVN : JVNVU#90583059
Revision History

  • [2026/05/22]
      Web page was published