CVE-2026-34928
Description
An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different named pipe communication mechanism.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An origin validation vulnerability in the Apex One/SEP agent named pipe allows local privilege escalation; requires low-privileged code execution.
Vulnerability
An origin validation vulnerability exists in the named pipe communication mechanism of the Trend Micro Apex One and Vision One Standard Endpoint Protection (SEP) agent. The flaw allows a local attacker who has already obtained low-privileged code execution on the target system to escalate privileges. This vulnerability is similar to CVE-2026-34927 but affects a different named pipe. Affected versions include Apex One 2019 (on-prem) server and agent builds below 14.0.0.17079, and Apex One as a Service / Vision One SEP agent builds below 14.0.20731 [1].
Exploitation
To exploit this vulnerability, an attacker must first gain the ability to execute low-privileged code on the target Windows system. Once that foothold is established, the attacker can interact with the vulnerable named pipe, bypassing origin validation to trigger privilege escalation. The exact sequence involves sending crafted messages over the named pipe to exploit the validation flaw [1].
Impact
Successful exploitation allows the attacker to escalate privileges from a low-privileged user context to a higher privilege level, potentially gaining SYSTEM or administrative access. This can lead to full compromise of the affected endpoint, including the ability to install programs, view, change, or delete data, and create new accounts with full user rights [1].
Mitigation
Trend Micro has released fixed versions: for Apex One (on-prem), apply SP1 Critical Patch Build 18012 (or install SP1 Build 17079 for new installations) to ensure agent build 14.0.0.17079 or later; for Apex One as a Service and Vision One SEP, update to Security Agent build 14.0.20731 or later. These updates were made available on May 21, 2026. Trend Micro has observed at least one instance of active exploitation in the wild, so immediate patching is strongly recommended [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
12- InstallFix and Claude Code: How Fake Install Pages Lead to Real CompromiseTrend Micro Research · May 5, 2026
- ZDI-26-269: TrendAI Apex One Console Directory Traversal Remote Code Execution VulnerabilityZero Day Initiative · Apr 15, 2026
- ZDI-26-270: TrendAI Apex One Console Directory Traversal Remote Code Execution VulnerabilityZero Day Initiative · Apr 15, 2026
- Copyright Lures Mask a Multi‑Stage PureLog Stealer Attack on Key IndustriesTrend Micro Research · Mar 19, 2026
- ZDI-26-136: Trend Micro Apex One Console Directory Traversal Remote Code Execution VulnerabilityZero Day Initiative · Mar 3, 2026
- ZDI-26-143: Trend Micro Apex One Security Agent TmSelfProtect Origin Validation Error Local Privilege Escalation VulnerabilityZero Day Initiative · Mar 3, 2026
- ZDI-26-140: Trend Micro Apex One Origin Validation Error Local Privilege Escalation VulnerabilityZero Day Initiative · Mar 3, 2026
- ZDI-26-141: Trend Micro Apex One Security Agent iCore Service Signature Verification Time-Of-Check Time-Of-Use Local Privilege Escalation VulnerabilityZero Day Initiative · Mar 3, 2026
- ZDI-26-137: Trend Micro Apex One Console Directory Traversal Remote Code Execution VulnerabilityZero Day Initiative · Mar 3, 2026
- ZDI-26-139: Trend Micro Apex One Security Agent iCore Service Origin Validation Error Local Privilege Escalation VulnerabilityZero Day Initiative · Mar 3, 2026
- ZDI-26-142: Trend Micro Apex One Security Agent Cache Mechanism Time-Of-Check Time-Of-Use Local Privilege Escalation VulnerabilityZero Day Initiative · Mar 3, 2026
- ZDI-26-138: Trend Micro Apex One Virus Scan Engine Link Following Local Privilege Escalation VulnerabilityZero Day Initiative · Mar 3, 2026