VYPR
High severity7.8NVD Advisory· Published May 21, 2026· Updated May 21, 2026

CVE-2026-45207

CVE-2026-45207

Description

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45206 but exists in a different process protection communication mechanism.

Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An origin validation bug in Apex One/SEP agent allows local privilege escalation from low-privileged code.

Vulnerability

An origin validation vulnerability exists in the Apex One and Vision One – Standard Endpoint Protection (SEP) agent on Windows. The flaw resides in a process protection communication mechanism, similar to CVE-2026-45206 but affecting a different code path [1]. Affected versions are Apex One 2019 (on-prem) server and agent builds below 17079, and SEP agent builds below 14.0.20731 [1].

Exploitation

An attacker must first obtain the ability to execute low-privileged code on the target system [1]. The vulnerability is then exploited by leveraging the missing origin validation in the agent's inter-process communication, allowing the attacker to manipulate the communication channel to escalate privileges. TrendAI has observed at least one instance of active exploitation in the wild [1].

Impact

Successful exploitation allows a local attacker to escalate privileges on affected installations [1]. By gaining higher privileges, the attacker could potentially execute arbitrary code with elevated rights, compromise system integrity, and access sensitive data.

Mitigation

TrendAI released fixed builds: for Apex One (on-prem) minimum agent build 14.0.0.17079 (new installs) or SP1 CP Build 18012 (for existing SP1 users); for Apex One as a Service and Vision One SEP, minimum agent build 14.0.20731 [1]. Customers who applied the previous CP 17079 build or installed fresh 17079 are already protected [1]. TrendAI recommends obtaining the latest product version from the Download Center [1].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.