Trend Micro Addresses critical vulnerabilities in PolicyServer

Trend Micro has patched eight vulnerabilities (CVE-2025-49211 to CVE-2025-49218) in its Endpoint Encryption PolicyServer for Windows, with CVSS scores ranging from 7.7 to 9.8. The flaws include SQL injection, insecure deserialization, and authentication bypass issues, which could allow privilege escalation and remote code execution without authentication. While no active exploitation has been reported, users are advised to upgrade to version 6.0.0.4013 and apply Network IPS filters 45072 and 45073 to reduce exposure.

Technical Description

CVE-2025-49211 to CVE-2025-49218 are critical vulnerabilities in Trend Micro’s Endpoint Encryption PolicyServer for Windows, including SQL injection, insecure deserialization, and authentication bypass flaws, with CVSS scores reaching up to 9.8. These issues could allow attackers to escalate privileges or perform remote code execution without authentication. Although no active exploitation has been observed, Trend Micro strongly advises updating to version 6.0.0.4013 and applying IPS filters 45072 and 45073 to mitigate the risks.

CVE CVSS Score Vulnerability Name Affected Product Patch / Mitigation
CVE-2025-49211 7.7 SQL Injection (Privilege Escalation) Trend Micro Endpoint Encryption PolicyServer for Windows Update to version 6.0.0.4013 and apply IPS filters 45072, 45073
CVE-2025-49215 8.8 SQL Injection (Post-Auth RCE)
CVE-2025-49218 7.7 SQL Injection (Post-Auth RCE)
CVE-2025-49212 9.8 Insecure Deserialization (Pre-Auth RCE)
CVE-2025-49213 9.8 Insecure Deserialization (Pre-Auth RCE)
CVE-2025-49214 8.8 Insecure Deserialization (Low-Priv Execution)
CVE-2025-49217 9.8 Insecure Deserialization (Pre-Auth RCE)
CVE-2025-49216 9.8 Authentication Bypass (Admin Access)

SQL Injection Vulnerabilities:

  • CVE-2025-49211 CVSS Score: 7.7

A local SQL injection vulnerability (CWE-89) that enables privilege escalation by executing code with low privileges. This flaw compromises the confidentiality, integrity, and availability of the system.

  • CVE-2025-49215 CVSS Score: 8.8

A post-authentication SQL injection vulnerability that permits escalation of privileges via low-privileged code execution, potentially impacting critical system components.

  • CVE-2025-49218 CVSS Score: 7.7

Like CVE-2025-49215, this is a post-authentication SQL injection issue requiring low-privileged code execution to elevate access rights.

Insecure Deserialization Vulnerabilities:

  • CVE-2025-49212 CVSS Score: 9.8

A pre-authentication insecure deserialization vulnerability (CWE-477) that allows remote code execution as SYSTEM due to the use of obsolete functions.

  • CVE-2025-49213 CVSS Score: 9.8

This pre-authentication flaw also involves insecure deserialization using outdated functions, enabling attackers to execute arbitrary code with SYSTEM-level privileges.

  • CVE-2025-49214 CVSS Score: 8.8

An insecure deserialization vulnerability requiring low-privileged code execution. Successful exploitation allows SYSTEM-level remote code execution.

  • CVE-2025-49217 CVSS Score: 9.8

Another pre-authentication insecure deserialization issue that lets attackers achieve remote code execution by exploiting obsolete function usage.

Authentication Bypass Vulnerability:

  • CVE-2025-49216 CVSS Score: 9.8

An authentication bypass flaw (CWE-477) in the DbAppDomain service that allows unauthenticated attackers to invoke admin-level methods and modify configurations. This significantly increases the risk of system compromise by bypassing standard security controls.

Conclusion:

In summary, the identified vulnerabilities in Trend Micro Endpoint Encryption PolicyServer, including critical SQL injection, insecure deserialization, and authentication bypass flaws, pose significant risks such as privilege escalation and remote code execution. These vulnerabilities have high severity scores, with several exploitable before authentication, increasing the attack surface considerably. To mitigate these risks, it is strongly recommended to update the product to version 6.0.0.4013 and apply the relevant Network IPS filters (45072 and 45073). Prompt patching will help ensure protection against potential exploitation and maintain system integrity.

Impact

These vulnerabilities severely impact confidentiality, integrity, and availability by enabling privilege escalation and remote code execution, which could compromise encryption keys and endpoint security. The authentication bypass vulnerability (CVE-2025-49216) undermines critical access controls, allowing unauthorized administrative actions. Additionally, pre-authentication remote code execution flaws expose systems to full compromise without requiring prior access. Together, these issues pose a significant threat to overall system security and stability.

IOC and Context Details

Topics Details
Tactic Name Privilege Escalation, Execution, Defense Evasion, Initial Access, Impact
Technique Name Exploitation for Privilege Escalation,
Exploitation of Remote Services,
Authentication Bypass,
Exploit Public-Facing Application,
Data Manipulation
Sub Technique Name Exploitation of Vulnerability (T1068),
Remote Code Execution (T1210),
Authentication Bypass (T1110),
SQL Injection (T1190),
Data Destruction or Corruption (T1485)
Attack Type Vulnerability
Targeted Applications Generic Applications, Trend Micro PolicyServer
Region Impacted Global
Industry Impacted All Industries
IOC’s NA
CVE CVE-2025-49211, CVE-2025-49212, CVE-2025-49213, CVE-2025-49214,
CVE-2025-49215, CVE-2025-49216, CVE-2025-49217, CVE-2025-49218

Recommended Actions

  • Apply Patches Without Delay: Upgrade to Trend Micro Endpoint Encryption PolicyServer version 6.0.0.4013 (Patch 1 Update 6) to fully remediate the identified vulnerabilities.
  • Deploy Network IPS Filters: Implement TippingPoint and Trend Micro Cloud One filters (IDs 45072 and 45073) to enhance proactive defense against attacks.
  • Limit Remote Access: Restrict access to PolicyServer systems by allowing only trusted internal IP addresses, using network segmentation or VPNs for added security.
  • Strengthen Monitoring: Increase vigilance by monitoring for unusual activities, especially any admin-level configuration changes or unauthorized code execution attempts.
  • Review Perimeter Defenses: Conduct thorough audits of perimeter security policies to ensure critical systems remain shielded from exposure to untrusted or public networks.

References

https://success.trendmicro.com/en-US/solution/KA-0019928