Summary: Trend Micro releases Critical patches for ‘Build 7190’, addressing Multiple Vulnerabilities Including RCE & DoS
| OEM | Trend Micro |
| Severity | Critical |
| CVSS Score | 9.8 |
| CVEs | CVE-2025-69258, CVE-2025-69259, CVE-2025-69260 |
| POC Available | No |
| Actively Exploited | Yes |
| Exploited in Wild | Yes |
| Advisory Version | 1.0 |
Overview
Trend Micro released Critical Patch Build 7190 for Apex Central (on-premises) addressing multiple high/critical vulnerabilities, including a remote code execution (RCE) flaw in MsgReceiver.exe exploited via unauthenticated network access on TCP port 20001.
Additional flaws enable denial-of-service (DoS) via unchecked NULL returns and out-of-bounds reads. Affected versions are below Build 7190 on Windows. Administrators must apply latest version build immediately to mitigate RCE, crashes and service disruptions.
| Vulnerability Name | CVE ID | Product Affected | Severity | Fixed Version |
| LoadLibraryEX Remote Code Execution (RCE) Vulnerability | CVE-2025-69258 | Apex Central (on-premise) | Critical | Build 7190 |
| Message Unchecked NULL Return Value Denial of Service (DoS) Vulnerability | CVE-2025-69259 | Apex Central (on-premise) | High | Build 7190 |
| Message Out-of-bounds Read Denial of Service (DoS) Vulnerability | CVE-2025-69260 | Apex Central (on-premise) | High | Build 7190 |
Technical Summary
The critical vulnerability has in its unauthenticated MsgReceiver.exe service on TCP port 20001 which is a remote code execution vulnerability lets attackers load arbitrary DLLs into a privileged process for SYSTEM-level code execution and full compromise.
Alongside two denial-of-service issues causing crashes where one due to unchecked NULL return values in message parsing leading to invalid memory access, and another via out-of-bounds reads from oversized strings.
All the vulnerabilities exploitable remotely without privileges, requiring urgent patching to Build 7190.
| CVE ID | System Affected | Vulnerability Details | Impact |
| CVE-2025-69258 | Apex Central < Build 7190 | Unauthenticated attackers can remotely load a malicious DLL into MsgReceiver.exe using crafted network messages on TCP port 20001 | RCE, Complete server compromise |
| CVE-2025-69259 | Apex Central < Build 7190 | Processing malformed messages (no auth required) leads to unhandled NULL from string search, causing invalid pointer operations | Dos, Service crash |
| CVE-2025-69260 | Apex Central < Build 7190 | Oversized string parameters in messages (no auth required) trigger buffer overruns during parsing | Dos, Service crash |
Recommendations
If immediate update is not possible
Conclusion
This critical patch for Trend Micro Apex Central resolves multiple high-severity vulnerabilities including remote code execution and denial-of-service issues that pose significant risks to on-premise deployments.
Organizations should prioritize immediate deployment of Build 7190, implement network controls like port blocking and maintain vigilant monitoring to safeguard against exploitation.
References: