What is Trend Micro Apex One?
Trend Micro Apex One is an enterprise endpoint protection platform (EPP) used by organizations to centrally manage antivirus, EDR, and threat detection across all managed endpoints. It uses a central on-premise server that communicates with lightweight security agents installed on every managed workstation and server in the organization. The management server distributes policy updates, detection patterns, and configuration changes to agents automatically — making the server a high-value pivot point: an attacker who compromises the Apex One server gains the ability to push arbitrary changes to every protected endpoint in the network. Security product management servers are a recurring target precisely because they have trusted, authenticated channels to every endpoint they manage.
Overview
CVE-2026-34926 is a relative path traversal vulnerability in the Trend Micro Apex One on-premise server that allows an attacker with local administrative access to traverse outside an intended directory and overwrite a key table file on the server. By injecting malicious code into this table, the attacker causes the Apex One server to distribute the malicious code to all managed security agents deployed across the organization's endpoints. Despite a MEDIUM CVSS score (6.7), the Scope:Changed rating and the supply-chain-like propagation to agents across the environment explain the CISA KEV addition. JPCERT/CC confirmed active exploitation in the wild at the time of the May 2026 patch.
The cloud (SaaS) version of Apex One was patched server-side during April 2026 maintenance; on-premise customers need to apply the server and agent patches from Trend Micro's advisory KA-0023430. Trend Micro Vision One Endpoint Security – Standard Endpoint Protection (the successor product) is also affected on the agent component.
Affected Versions
| Product | Vulnerable | Fixed |
|---|---|---|
| Apex One (On-Premise) | Versions prior to May 2026 patch | Apply KA-0023430 patch |
| Apex One as a Service (SaaS) | Server patched April 2026; agent component affected | Apply agent update from KA-0023430 |
| Trend Micro Vision One — Standard Endpoint Protection | Agent component affected | Apply agent update from KA-0023430 |
Note: Specific build numbers are documented in the Trend Micro advisory KA-0023430, which requires a Trend Micro account to access.
Technical Details
CWE-23 (Relative Path Traversal). The Apex One on-premise server exposes functionality that allows administrators to interact with server-side key table files that define update and configuration data distributed to managed agents. A flaw in path handling allows a specially crafted input to traverse outside the intended directory using ../ sequences, reaching and overwriting a key table file that lies outside the expected directory boundary.
An attacker with local administrative access to the Apex One server (PR:H) exploits the traversal to overwrite the key table with attacker-controlled content. The Apex One server then distributes this modified table to all connected security agents as part of its normal update distribution process — causing every managed endpoint to receive and apply the injected malicious code.
The AC:H rating reflects that the attacker must be positioned with admin credentials on the server and must correctly craft the traversal path. The S:C (Scope:Changed) rating captures the cross-machine impact: exploitation on the server directly affects agents running on separate endpoint systems throughout the organization. In environments with hundreds or thousands of managed endpoints, a single server-side traversal translates into organization-wide endpoint compromise.
Discovery
No researcher has been publicly credited for discovering CVE-2026-34926. Trend Micro and JPCERT/CC both published advisories on 2026-05-21, and JPCERT's alert explicitly confirmed active in-the-wild exploitation, indicating the vulnerability was identified during incident response rather than through proactive research disclosure.
Exploitation Context
JPCERT/CC confirmed active exploitation of CVE-2026-34926 in attacks against Japanese organizations at the time of the advisory. CISA added it to KEV the same day. No specific threat actor, ransomware group, or nation-state has been publicly attributed.
The exploitation of security product management servers has become a common tactic for sophisticated attackers seeking broad endpoint access — compromising the management server provides a trusted, authenticated channel to every managed endpoint in the deployment, enabling lateral movement at scale without needing to exploit individual endpoints separately. This pattern has been observed with other endpoint security product servers in recent years.
Remediation
- Apply the Trend Micro patch from advisory KA-0023430 immediately — both server and agent components require updating.
- For Apex One as a Service customers: the server was patched during April 2026 maintenance; apply the agent update from KA-0023430 to complete remediation.
- Audit Apex One server access logs for evidence of directory traversal patterns or unexpected key table modifications.
- Review agent deployment logs across managed endpoints for any unexpected updates or configuration changes pushed from the server in recent weeks.
- Restrict administrative access to the Apex One management server to dedicated management networks; ensure the server is not internet-accessible.
- Apply the principle of least privilege to Apex One server administrator accounts — limit who can authenticate with admin-level access to the management console.
See Also
This CVE is part of a sustained pattern of Trend Micro Apex One management console vulnerabilities in CISA KEV spanning 2019–2026. See Attacking the Defenders: The Persistent Pattern of AV and EDR Products in CISA KEV for analysis of 18 KEV entries across Microsoft Defender, Trend Micro Apex One, McAfee, and Sophos.
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2026-34926 |
| Vendor / Product | Trend Micro — Apex One |
| NVD Published | 2026-05-21 |
| NVD Last Modified | 2026-05-21 |
| CVSS 3.1 Score | 6.7 |
| CVSS 3.1 Vector | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L |
| Severity | MEDIUM |
| CWE | CWE-23 find similar ↗ |
| CISA KEV Added | 2026-05-21 |
| CISA KEV Deadline | 2026-06-04 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Required Action
Timeline
| Date | Event |
|---|---|
| 2026-05-21 | Trend Micro publishes advisory KA-0023430 patching CVE-2026-34926; JPCERT/CC issues alert confirming active exploitation in the wild; CISA adds to KEV same day |
| 2026-06-04 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| Trend Micro Security Advisory KA-0023430 | Vendor Advisory |
| JPCERT/CC Alert — Vulnerabilities in Trend Micro Apex One | Vulnerability Database |
| NVD — CVE-2026-34926 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |