JVNDB-2025-003091
Vulnerability from jvndb - Published: 2025-04-09 14:55 - Updated:2025-04-09 14:55Summary
Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises (April 2025)
Details
Trend Micro Incorporated has released security updates for Endpoint security products for enterprises.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.
References
| Type | URL | |
|---|---|---|
|
|
||
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-003091.html",
"dc:date": "2025-04-09T14:55+09:00",
"dcterms:issued": "2025-04-09T14:55+09:00",
"dcterms:modified": "2025-04-09T14:55+09:00",
"description": "Trend Micro Incorporated has released security updates for Endpoint security products for enterprises.\r\n\r\nTrend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.",
"link": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-003091.html",
"sec:cpe": [
{
"#text": "cpe:/a:trendmicro:apex_central_%28saas%29",
"@product": "Trend Micro Apex Central SaaS",
"@vendor": "Trend Micro, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/a:trendmicro:apex_central_2019",
"@product": "Trend Micro Apex Central 2019",
"@vendor": "Trend Micro, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/a:trendmicro:deep_security_agent",
"@product": "Deep Security Agent",
"@vendor": "Trend Micro, Inc.",
"@version": "2.2"
}
],
"sec:identifier": "JVNDB-2025-003091",
"sec:references": [
{
"#text": "https://jvn.jp/en/vu/JVNVU98349623/index.html",
"@id": "JVNVU#98349623",
"@source": "JVN"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-30678",
"@id": "CVE-2025-30678",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-30679",
"@id": "CVE-2025-30679",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-30680",
"@id": "CVE-2025-30680",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-30640",
"@id": "CVE-2025-30640",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-30641",
"@id": "CVE-2025-30641",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-30642",
"@id": "CVE-2025-30642",
"@source": "CVE"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-59",
"@title": "Link Following(CWE-59)"
},
{
"#text": "https://cwe.mitre.org/data/definitions/918.html",
"@id": "CWE-918",
"@title": "Server-Side Request Forgery (SSRF)(CWE-918)"
}
],
"title": "Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises (April 2025)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…