CVE-2025-69259
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
08/01/2026
Last modified:
15/01/2026
Description
A message unchecked NULL return value vulnerability in Trend Micro Apex Central could allow a remote attacker to create a denial-of-service condition on affected installations.<br />
<br />
Please note: authentication is not required in order to exploit this vulnerability..
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:trendmicro:apex_central:2019:-:*:*:-:*:*:* | ||
| cpe:2.3:a:trendmicro:apex_central:2019:build_3752:*:*:-:*:*:* | ||
| cpe:2.3:a:trendmicro:apex_central:2019:build_5158:*:*:-:*:*:* | ||
| cpe:2.3:a:trendmicro:apex_central:2019:build_6016:*:*:-:*:*:* | ||
| cpe:2.3:a:trendmicro:apex_central:2019:build_6288:*:*:-:*:*:* | ||
| cpe:2.3:a:trendmicro:apex_central:2019:build_6394:*:*:-:*:*:* | ||
| cpe:2.3:a:trendmicro:apex_central:2019:build_6481:*:*:-:*:*:* | ||
| cpe:2.3:a:trendmicro:apex_central:2019:build_6511:*:*:-:*:*:* | ||
| cpe:2.3:a:trendmicro:apex_central:2019:build_6571:*:*:-:*:*:* | ||
| cpe:2.3:a:trendmicro:apex_central:2019:build_6658:*:*:-:*:*:* | ||
| cpe:2.3:a:trendmicro:apex_central:2019:build_6660:*:*:-:*:*:* | ||
| cpe:2.3:a:trendmicro:apex_central:2019:build_6890:*:*:-:*:*:* | ||
| cpe:2.3:a:trendmicro:apex_central:2019:build_6955:*:*:-:*:*:* | ||
| cpe:2.3:a:trendmicro:apex_central:2019:build_7007:*:*:-:*:*:* | ||
| cpe:2.3:a:trendmicro:apex_central:2019:build_7065:*:*:-:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



