Medium-severity Apex One zero-day patched after exploitation in on-premises deployments
Summary
Hide ▲
Show ▼
Trend Micro patched CVE-2026-34926, a medium-severity directory traversal flaw in Apex One on-premises installations, after confirming in-the-wild exploitation targeting Windows systems. The vulnerability allowed local attackers with admin credentials to inject malicious code into server key tables and deploy payloads to agents. CISA added the CVE to its Known Exploited Vulnerabilities (KEV) catalog on May 22, 2026, requiring federal agencies to remediate by June 4, 2026. Concurrently, Trend Micro released updates addressing seven local privilege escalation vulnerabilities in the Apex One Standard Endpoint Protection agent. Threat actors have repeatedly exploited Apex One flaws in zero-day attacks, including prior incidents tracked as CVE-2025-54948 (August 2025), CVE-2022-40139 (September 2022), and CVE-2023-41179 (September 2023).
Timeline
-
22.05.2026 11:19 2 articles · 10h ago
CVE-2026-34926 patched after in-the-wild exploitation in Apex One on-premises environments
Trend Micro confirmed at least one observed exploitation attempt of CVE-2026-34926 against Windows systems, clarifying exploitation prerequisites for the directory traversal vulnerability in Apex One on-premises servers. CISA reaffirmed the KEV inclusion and federal mitigation deadline of June 4, 2026, citing significant risks to federal enterprises. The patch also addressed seven additional local privilege escalation vulnerabilities in the Apex One Standard Endpoint Protection agent. Additional context reaffirmed historical zero-day exploitation patterns in Apex One, including prior cases such as CVE-2025-54948 (August 2025), CVE-2022-40139 (September 2022), and CVE-2023-41179 (September 2023).
Show sources
- TrendAI Patches Apex One Zero-Day Exploited in the Wild — www.securityweek.com — 22.05.2026 11:19
- Trend Micro warns of Apex One zero-day exploited in the wild — www.bleepingcomputer.com — 22.05.2026 16:39
Information Snippets
-
CVE-2026-34926 is a medium-severity directory traversal vulnerability affecting Trend Micro Apex One on-premises installations.
First reported: 22.05.2026 11:192 sources, 2 articlesShow sources
- TrendAI Patches Apex One Zero-Day Exploited in the Wild — www.securityweek.com — 22.05.2026 11:19
- Trend Micro warns of Apex One zero-day exploited in the wild — www.bleepingcomputer.com — 22.05.2026 16:39
-
Exploitation requires local admin credentials to the Apex One server and allows unauthenticated attackers to modify server key tables to inject malicious code deployed to agents.
First reported: 22.05.2026 11:192 sources, 2 articlesShow sources
- TrendAI Patches Apex One Zero-Day Exploited in the Wild — www.securityweek.com — 22.05.2026 11:19
- Trend Micro warns of Apex One zero-day exploited in the wild — www.bleepingcomputer.com — 22.05.2026 16:39
-
The vulnerability was exploited in the wild before TrendAI released a patch; TrendAI’s internal incident response team identified the issue.
First reported: 22.05.2026 11:192 sources, 2 articlesShow sources
- TrendAI Patches Apex One Zero-Day Exploited in the Wild — www.securityweek.com — 22.05.2026 11:19
- Trend Micro warns of Apex One zero-day exploited in the wild — www.bleepingcomputer.com — 22.05.2026 16:39
-
CISA added CVE-2026-34926 to the Known Exploited Vulnerabilities (KEV) catalog on May 22, 2026, mandating federal agencies to remediate by June 4, 2026.
First reported: 22.05.2026 11:192 sources, 2 articlesShow sources
- TrendAI Patches Apex One Zero-Day Exploited in the Wild — www.securityweek.com — 22.05.2026 11:19
- Trend Micro warns of Apex One zero-day exploited in the wild — www.bleepingcomputer.com — 22.05.2026 16:39
-
CISA’s KEV catalog includes 10 other CVEs previously assigned to Apex One flaws, indicating recurring exploitation patterns in this product line.
First reported: 22.05.2026 11:191 source, 1 articleShow sources
- TrendAI Patches Apex One Zero-Day Exploited in the Wild — www.securityweek.com — 22.05.2026 11:19
-
The latest Apex One update also addresses multiple high-severity local privilege escalation vulnerabilities exploitable with physical or remote access to vulnerable systems.
First reported: 22.05.2026 11:192 sources, 2 articlesShow sources
- TrendAI Patches Apex One Zero-Day Exploited in the Wild — www.securityweek.com — 22.05.2026 11:19
- Trend Micro warns of Apex One zero-day exploited in the wild — www.bleepingcomputer.com — 22.05.2026 16:39
-
Trend Micro confirmed the exploitation of CVE-2026-34926 in at least one observed attack against Windows systems.
First reported: 22.05.2026 16:391 source, 1 articleShow sources
- Trend Micro warns of Apex One zero-day exploited in the wild — www.bleepingcomputer.com — 22.05.2026 16:39
-
CVE-2026-34926 requires administrative credentials to the Apex One Server and local access to exploit, despite being described as pre-authenticated.
First reported: 22.05.2026 16:391 source, 1 articleShow sources
- Trend Micro warns of Apex One zero-day exploited in the wild — www.bleepingcomputer.com — 22.05.2026 16:39
-
CISA cited the vulnerability's active exploitation as a significant risk to federal enterprises and mandated mitigation by June 4, 2026.
First reported: 22.05.2026 16:391 source, 1 articleShow sources
- Trend Micro warns of Apex One zero-day exploited in the wild — www.bleepingcomputer.com — 22.05.2026 16:39
-
Trend Micro simultaneously addressed seven additional local privilege escalation vulnerabilities in the Apex One Standard Endpoint Protection agent.
First reported: 22.05.2026 16:391 source, 1 articleShow sources
- Trend Micro warns of Apex One zero-day exploited in the wild — www.bleepingcomputer.com — 22.05.2026 16:39
-
Threat actors have repeatedly targeted Apex One flaws in zero-day attacks, including CVE-2025-54948 in August 2025 and two prior zero-days in 2022 and 2023.
First reported: 22.05.2026 16:391 source, 1 articleShow sources
- Trend Micro warns of Apex One zero-day exploited in the wild — www.bleepingcomputer.com — 22.05.2026 16:39
Similar Happenings
Critical RCE Flaw in Trend Micro Apex Central On-Prem Windows
Trend Micro has addressed critical vulnerabilities in on-premise Windows versions of Apex Central, including a remote code execution (RCE) flaw (CVE-2025-69258) with a CVSS score of 9.8. The flaw allows unauthenticated remote attackers to execute arbitrary code under SYSTEM context. Two additional flaws (CVE-2025-69259, CVE-2025-69260) with CVSS scores of 7.5 each can cause denial-of-service conditions. The vulnerabilities affect versions below Build 7190 and require physical or remote access to exploit. Apex Central is a web-based management console that helps admins manage multiple Trend Micro products and services, including antivirus, content security, and threat detection. Trend Micro has released Critical Patch Build 7190 to address these vulnerabilities.
Trend Micro Apex One Management Console 0-Day Exploited
Trend Micro has disclosed and patched two critical vulnerabilities, CVE-2025-71210 and CVE-2025-71211, in its on-premise Apex One Management Console. These vulnerabilities allow for remote code execution (RCE) on vulnerable Windows systems. Trend Micro has released Critical Patch Build 14136 to address these vulnerabilities, which also fixes two high-severity privilege escalation flaws in the Windows agent and four more affecting the macOS agent. The vulnerabilities are due to path traversal weaknesses in the management console and require attackers to have access to it. Previously, Trend Micro disclosed two other critical vulnerabilities, CVE-2025-54948 and CVE-2025-54987, which were actively exploited in the wild. These vulnerabilities allowed for command injection and remote code execution. Trend Micro has released temporary mitigations and is urging users to apply them immediately to protect against potential attacks.