CVE-2026-34926
Vulnerability Summary
Timeline
Description
A directory traversal vulnerability in the Apex One (on-premise) server could allow a pre-authenticated local attacker to modify a key table on the server to inject malicious code to deploy to agents on affected installations. This vulnerability is only exploitable on the on-premise version of Apex One and a potential attacker must have access to the Apex One Server and already obtained administrative credentials to the server via some other method to exploit this vulnerability.
CVSS Metrics
- v3.1•MEDIUM•Score: 6.7CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L
EPSS Trends
Current EPSS score: 0.25%• Percentile: 49%
Techniques & Countermeasures
- CWE-23•Relative Path Traversal
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
Affected Systems
- trend micro, inc.•trendai apex one
≥ 2019 (14.0), < 14.0.0.17079
- trend micro, inc.•trendai apex one as a service
≥ SaaS, < 14.0.20731