HomeVulnerabilityPattern Micro warns of vital Apex One code execution flaws

Pattern Micro warns of vital Apex One code execution flaws

Japanese cybersecurity software program agency Pattern Micro has patched two vital Apex One vulnerabilities that permit attackers to realize distant code execution (RCE) on susceptible Home windows methods.

Apex One is an endpoint security platform that detects and responds to security threats, together with malware, spyware and adware, malicious instruments, and vulnerabilities.

The primary vital Apex One security flaw patched this week (CVE-2025-71210) is because of a path traversal weak spot within the Pattern Micro Apex One administration console, permitting attackers with out privileges to execute malicious code on unpatched methods.

Wiz

The second, tracked as CVE-2025-71211, is one other Apex One administration console path traversal vulnerability, comparable in scope to CVE-2025-71210 however affecting a unique executable.

As Pattern Micro defined in a Tuesday security advisory, profitable exploitation requires attackers to “have entry to the Pattern Micro Apex One Administration Console, so clients which have their console’s IP handle uncovered externally ought to contemplate mitigating elements similar to supply restrictions if not already utilized.”

See also  One hacker, many names: Business collaboration goals to repair cyber menace label chaos

“Though an exploit could require a number of particular circumstances to be met, Pattern Micro strongly encourages clients to replace to the newest builds as quickly as potential,” it warned.

To handle these vital security flaws, Pattern Micro has patched the vulnerabilities within the SaaS Apex One variations and launched Crucial Patch Construct 14136, which additionally fixes two high-severity privilege escalation flaws within the Home windows agent and 4 extra affecting the macOS agent.

Whereas Pattern Micro has not flagged these vulnerabilities as exploited within the wild, risk actors have abused different Apex One in assaults during the last a number of years.

As an example, Pattern Micro warned clients to patch an actively exploited Apex One RCE vulnerability (CVE-2025-54948) in August 2025, and addressed two different Apex One zero-days exploited within the wild in September 2022 (CVE-2022-40139) and in September 2023 (CVE-2023-41179).

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) at present tracks 10 Pattern Micro Apex vulnerabilities which have both been or are nonetheless being exploited within the wild.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular