|
[Japanese]
|
JVNDB-2026-016802
|
Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises (May 2026)
|
Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises contain multiple vulnerabilities listed below.- Relative path traversal in Apex One server (CWE-23) - CVE-2026-34926
- The only product that could be vulnerable to this exploit is TrendAI Apex One (On Premise).
- Origin validation error in Security Agent (CWE-346) - CVE-2026-34927,CVE-2026-34928,CVE-2026-34929,CVE-2026-34930,CVE-2026-45206,CVE-2026-45207
- Time-of-check time-of-use (TOCTOU) race condition in Security Agent (CWE-367) - CVE-2026-45208
Trend Micro Incorporated has reported that attacks exploiting CVE-2026-34926 have been observed in the wild.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.
|
CVSS V3 Severity: Base Metrics 6.7 (Medium) [Other]
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: High
- User Interaction: None
- Scope: Changed
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: Low
The above CVSS base scores have been assigned for CVE-2026-34926 |
CVSS v3 Severity Base Metrics:7.8 (High) [Other]- Access Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact(C): High
- Integrity Impact(I): High
- Availability Impact(A): High
The above CVSS base scores have been assigned for CVE-2026-34927,CVE-2026-34928,CVE-2026-34929,CVE-2026-34930,CVE-2026-45206,CVE-2026-45207
|
CVSS v3 Severity Base Metrics:7.8 (High) [Other]- Access Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact(C): High
- Integrity Impact(I): High
- Availability Impact(A): High
The above CVSS base scores have been assigned for CVE-2026-45208
|
|
Trend Micro, Inc.
- Trend Micro Apex One as a Service Server: before the maintenance on April 2026
- Trend Micro Apex One as a Service Security Agent: Agent Build prior to 14.0.20731
- TrendAI Apex One (On Premise) Server: Build prior to 17079
- TrendAI Apex One (On Premise) Security Agent: Agent Build prior to 14.0.17079
- TrendAI Vision One Endpoint Security - Standard Endpoint Protection Server: before the maintenance on April 2026
- TrendAI Vision One Endpoint Security - Standard Endpoint Protection Security Agent: Agent Build prior to 14.0.20731
|
|
- An attacker who can access Apex One server with administrator privileges may be able to tamper with arbitrary files on the server, potentially allowing crafted code to be distributed to the security agent (CVE-2026-34926)
- An attacker who can access Security Agent may escalate privileges (CVE-2026-34927, CVE-2026-34928, CVE-2026-34929, CVE-2026-34930, CVE-2026-45206, CVE-2026-45207, CVE-2026-45208)
|
[Apply the Patch]
Apply the appropriate patch according to the information provided by the developer.
The developer has released the patchs listed below that address the vulnerabilities. - TrendAI Apex One (On Premise)
- Server: Service Pack 1 Critical Patch B18012
- Security Agent: Agent Build 14.0.18012
- Trend Micro Apex One as a Service
- Server: fixed with April 2026 maintenance
- Security Agent: Agent Build 14.0.20731
- TrendAI Vision One Endpoint Security - Standard Endpoint Protection
- Server: fixed with April 2026 maintenance
- Security Agent: Agent Build 14.0.20731
|
Trend Micro, Inc.
|
- Relative Path Traversal(CWE-23) [Other]
- Origin Validation Error(CWE-346) [Other]
- Time-of-check Time-of-use (TOCTOU) Race Condition(CWE-367) [Other]
|
- CVE-2026-34926
- CVE-2026-34927
- CVE-2026-34928
- CVE-2026-34929
- CVE-2026-34930
- CVE-2026-45206
- CVE-2026-45207
- CVE-2026-45208
|
- JVN : JVNVU#90583059
|
- [2026/05/22]
Web page was published
|