Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las últimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las últimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las últimas vulnerabilidades incorporadas al repositorio.

CVE-2026-34928

Fecha de publicación:
21/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different named pipe communication mechanism.<br /> <br /> Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Gravedad CVSS v3.1: ALTA
Última modificación:
21/05/2026

CVE-2026-34929

Fecha de publicación:
21/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different inter-process communication mechanism.<br /> <br /> Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Gravedad CVSS v3.1: ALTA
Última modificación:
21/05/2026

CVE-2026-34930

Fecha de publicación:
21/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different process protection mechanism.<br /> <br /> Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Gravedad CVSS v3.1: ALTA
Última modificación:
21/05/2026

CVE-2026-34926

Fecha de publicación:
21/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A directory traversal vulnerability in the Apex One (on-premise) server could allow a pre-authenticated local attacker to modify a key table on the server to inject malicious code to deploy to agents on affected installations.<br /> <br /> <br /> This vulnerability is only exploitable on the on-premise version of Apex One and a potential attacker must have access to the Apex One Server and already obtained administrative credentials to the server via some other method to exploit this vulnerability.
Gravedad CVSS v3.1: MEDIA
Última modificación:
21/05/2026

CVE-2025-71214

Fecha de publicación:
21/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** An origin validation error vulnerability in the Trend Micro Apex One (mac) agent iCore service could allow a local attacker to escalate privileges on affected installations.<br /> <br /> Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.<br /> <br /> The following information is provided as informational only for CVE references, as these were addressed already via ActiveUpdate/SaaS updates in mid to late 2025 (SaaS 2507 &amp; 2005 Yearly Release).
Gravedad CVSS v3.1: ALTA
Última modificación:
21/05/2026

CVE-2025-71215

Fecha de publicación:
21/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A time-of-check time-of-use vulnerability in the Trend Micro Apex One (mac) agent iCore service signature verification could allow a local attacker to escalate privileges on affected installations.<br /> <br /> Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.<br /> <br /> The following information is provided as informational only for CVE references, as these were addressed already via ActiveUpdate/SaaS updates in mid to late 2025 (SaaS 2507 &amp; 2005 Yearly Release).
Gravedad CVSS v3.1: ALTA
Última modificación:
21/05/2026

CVE-2025-71216

Fecha de publicación:
21/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A time-of-check time-of-use vulnerability in the Trend Micro Apex One (mac) agent cache mechanism could allow a local attacker to escalate privileges on affected installations.<br /> <br /> Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.<br /> <br /> The following information is provided as informational only for CVE references, as these were addressed already via ActiveUpdate/SaaS updates in mid to late 2025 (SaaS 2507 &amp; 2005 Yearly Release).
Gravedad CVSS v3.1: ALTA
Última modificación:
21/05/2026

CVE-2025-71217

Fecha de publicación:
21/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** An origin validation error vulnerability in the Trend Micro Apex One (mac) agent self-protection mechanism could allow a local attacker to escalate privileges on affected installations.<br /> <br /> Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.<br /> <br /> The following information is provided as informational only for CVE references, as these were addressed already via ActiveUpdate/SaaS updates in mid to late 2025 (SaaS 2507 &amp; 2005 Yearly Release).
Gravedad CVSS v3.1: ALTA
Última modificación:
21/05/2026

CVE-2026-2740

Fecha de publicación:
21/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Zohocorp ManageEngine ADSelfService Plus version before 6525, DataSecurity Plus before 6264 and RecoveryManager Plus before 6313 are vulnerable to Authenticated Remote code execution in the agent machines due to the bug in the 3rd party dependency.
Gravedad CVSS v3.1: ALTA
Última modificación:
21/05/2026

CVE-2025-71210

Fecha de publicación:
21/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations.<br /> <br /> Please note: although this vulnerability carries a technical critical CVSS rating, this was reported via responsible disclosure via a researcher through the Zero Day Initiative. The SaaS versions of the product have already been mitigated and no customer action required.<br /> <br /> For this particular vulnerability, an attacker must have access to the Trend Micro Apex One Management Console, so customers that have their console�s IP address exposed externally should consider mitigating factors such as source restrictions if not already applied.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
21/05/2026

CVE-2025-71211

Fecha de publicación:
21/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations. This vulnerability is similar in scope to CVE-2025-71210 but affects a different executable. <br /> <br /> Please note: although this vulnerability carries a technical critical CVSS rating, this was reported via responsible disclosure via a researcher through the Zero Day Initiative. The SaaS versions of the product have already been mitigated and no customer action required.<br /> <br /> For this particular vulnerability, an attacker must have access to the Trend Micro Apex One Management Console, so customers that have their console�s IP address exposed externally should consider mitigating factors such as source restrictions if not already applied.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
21/05/2026

CVE-2025-71212

Fecha de publicación:
21/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A link following vulnerability in the Trend Micro Apex One scan engine could allow a local attacker to escalate privileges on affected installations.<br /> <br /> Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Gravedad CVSS v3.1: ALTA
Última modificación:
21/05/2026