HomeVulnerabilityPattern Micro fixes important vulnerabilities in a number of merchandise

Pattern Micro fixes important vulnerabilities in a number of merchandise

Pattern Micro has launched security updates to deal with a number of critical-severity distant code execution and authentication bypass vulnerabilities that influence its Apex Central and Endpoint Encryption (TMEE) PolicyServer merchandise.

The security vendor underlines that it has seen no proof of energetic exploitation within the wild for any of them. Nevertheless, instant utility of the security updates is beneficial to deal with the dangers.

Pattern Micro Endpoint Encryption PolicyServer is a central administration server for Pattern Micro Endpoint Encryption (TMEE), offering full disk encryption and detachable media encryption for Home windows-based endpoints.

The product is utilized in enterprise environments in regulated industries the place compliance with knowledge safety requirements is important.

With the most recent replace, Pattern Micro addressed the next high-severity and important flaws:

  • CVE-2025-49212  A pre-authentication distant code execution flaw brought on by insecure deserialization within the PolicyValueTableSerializationBinder class. Distant attackers can exploit it to execute arbitrary code as SYSTEM with out requiring login
  • CVE-2025-49213  A pre-authentication distant code execution vulnerability within the PolicyServerWindowsService class, stemming from deserialization of untrusted knowledge. Attackers can run arbitrary code as SYSTEM with no authentication required
  • CVE-2025-49216  An authentication bypass flaw within the DbAppDomain service as a consequence of a damaged auth implementation. Distant attackers can absolutely bypass login and carry out admin-level actions with out credentials
  • CVE-2025-49217 – A pre-authentication RCE vulnerability within the ValidateToken technique, triggered by unsafe deserialization. Whereas barely more durable to use, it nonetheless permits unauthenticated attackers to run code as SYSTEM
See also  Do not Overlook These 6 Important Okta Safety Configurations

It ought to be famous that whereas Pattern Micro’s security bulletin for Endpoint Encryption PolicyServer lists all 4 vulnerabilities above as important, ZDI’s advisory asessed CVE-2025-49217 as being a high-severity vulnerability.

Further points addressed by the most recent model of Endpoint Encryption PolicyServer inlcude 4 extra high-severity vulnerabilities (e.g. SQL injection and privileges escalation points).

All the vulnerabilities have been addressed in model 6.0.0.4013 (Patch 1 Replace 6). The failings influence all variations as much as the most recent, and there aren’t any mitigations or workarounds for them.


A second set of issues that Pattern Micro addressed impacts Apex Central, a centralized security administration console used for monitoring, configuring, and managing a number of Pattern Micro merchandise and security brokers throughout a corporation.

Each points are critical-severity, pre-authentication distant code execution flaws:

  • CVE-2025-49219 – A pre-authentication RCE flaw within the GetReportDetailView technique of Apex Central brought on by insecure deserialization. Exploiting this permits unauthenticated attackers to execute code within the context of NETWORK SERVICE. (CVSS 9.8)
  • CVE-2025-49220 – A pre-auth RCE in Apex Central within the ConvertFromJson technique. Improper enter validation throughout deserialization lets attackers execute arbitrary code remotely with out authentication. (CVSS 9.8)
See also  Vital Mitel, Oracle flaws discover lively exploitation, CISA urges patching

The problems have been fastened in Patch B7007 for Apex Central 2019 (on premise), whereas they’re robotically utilized on backend for Apex Central as a Service.

Tines Needle

Patching used to imply complicated scripts, lengthy hours, and infinite hearth drills. Not anymore.

On this new information, Tines breaks down how trendy IT orgs are leveling up with automation. Patch quicker, scale back overhead, and give attention to strategic work — no complicated scripts required.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular