HomeVulnerabilityPattern Micro warns of important Apex Central RCE vulnerability

Pattern Micro warns of important Apex Central RCE vulnerability

Japanese cybersecurity software program agency Pattern Micro has patched a important security flaw in Apex Central (on-premise) that would permit attackers to execute arbitrary code with SYSTEM privileges.

Apex Central is a web-based administration console that helps admins handle a number of Pattern Micro services (together with antivirus, content material security, and risk detection) and deploy elements like antivirus sample information, scan engines, and antispam guidelines from a single interface.

Tracked as CVE-2025-69258, the vulnerability permits risk actors with out privileges on the focused system to realize distant code execution by injecting malicious DLLs in low-complexity assaults that do not require person interplay.

Wiz

“A LoadLibraryEX vulnerability in Pattern Micro Apex Central might permit an unauthenticated distant attacker to load an attacker-controlled DLL right into a key executable, resulting in execution of attacker-supplied code beneath the context of SYSTEM on affected installations,” Pattern Micro mentioned in a security advisory printed this week.

As defined by cybersecurity firm Tenable, which reported the flaw and shared technical particulars and proof-of-concept code, unauthenticated distant attackers can ship a specifically crafted message to the MsgReceiver.exe course of listening on TCP port 20001, “resulting in execution of attacker-supplied code beneath the security context of SYSTEM.”

See also  Mit ShadowV2 wird DDoS zu einem Cloud-nativen Abo-Dienst

Whereas there are mitigating components, like weak programs being uncovered to Web assaults, Pattern Micro urged prospects to patch their programs as quickly as attainable.

“Along with well timed utility of patches and up to date options, prospects are additionally suggested to evaluation distant entry to important programs and guarantee insurance policies and perimeter security is up-to-date,” Pattern Micro added.

“Nonetheless, though an exploit could require a number of particular circumstances to be met, Pattern Micro strongly encourages prospects to replace to the newest builds as quickly as attainable.”

To handle this vulnerability, Pattern Micro has launched Crucial Patch Construct 7190, which additionally fixes two denial-of-service flaws (CVE-2025-69259 and CVE-2025-69260) that may be exploited by unauthenticated attackers.

The corporate patched one other distant code execution Apex Central vulnerability (CVE-2022-26871) three years in the past, warning prospects that it was actively exploited within the wild.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular