CVE-2026-34926
Description
A directory traversal vulnerability in the Apex One (on-premise) server could allow a pre-authenticated local attacker to modify a key table on the server to inject malicious code to deploy to agents on affected installations.
This vulnerability is only exploitable on the on-premise version of Apex One and a potential attacker must have access to the Apex One Server and already obtained administrative credentials to the server via some other method to exploit this vulnerability.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A pre-authenticated local attacker with admin credentials can exploit a directory traversal in Trend Micro Apex One (on-prem) to modify server tables and deploy malicious code to agents.
Vulnerability
CVE-2026-34926 is a relative path traversal vulnerability (CWE-23) in the Trend Micro Apex One (on-premise) server (builds prior to 17079 for new installations, or without Critical Patch build 18012 for existing SP1 users). The vulnerability resides in the server component and is triggered when a local attacker with administrative credentials modifies a key table via directory traversal, allowing injection of malicious code that is subsequently deployed to connected security agents. [1][2][3]
Exploitation
Exploitation requires the attacker to have local access to the Apex One server and to have already obtained administrative credentials for the server operating system through some other method (e.g., credential theft, social engineering). With those privileges, the attacker can craft a directory traversal request to modify a server key table, injecting arbitrary code. This code is then distributed to agents during normal update operations. Trend Micro has confirmed at least one instance of active exploitation in the wild. [1][2][4]
Impact
A successful attack allows the attacker to tamper with arbitrary files on the server and inject malicious code that is pushed to all connected security agents. This can lead to a compromise of agent integrity (tampering), potential agent unavailability (resource consumption), and indirectly to full system compromise on the affected endpoints. The CVSS v3.1 score is 6.7 (Medium), with a scope change from server to agents (confidentiality High, Integrity Low, Availability Low). [1][3]
Mitigation
Trend Micro released fixed builds: for on-prem Apex One, apply Critical Patch build 18012 for existing SP1 users, or perform a fresh install of SP1 build 17079. The security agent must be updated to at least build 14.0.0.17079. For Apex One as a Service and Vision One SEP, the agent build 14.0.20731 is available. No workaround is provided; immediate patching is strongly recommended as the vulnerability is being actively exploited. [2][3][4]
- [サポートニュース]アラート/アドバイザリ:TrendAI™ Apex Oneなどで確認された複数の脆弱性について(2026年5月):TrendAI™ Apex One、Trend Micro Apex One as a Service、TrendAI Vision One™ Endpoint Security
- ITW SECURITY BULLETIN: Apex One and Vision One – Standard Endpoint Protection (SEP) May 2026 Security Bulletin
- Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises (May 2026)
- Alert Regarding Multiple Vulnerabilities in Trend Micro Products Including TrendAI Apex One
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.