CVE-2026-34926 — Trend Micro Apex One (On-Premise) Directory Traversal Vulnerability

CVE-2026-34926

Trend Micro Apex One — Local Admin Path Traversal Overwrites Agent Key Table to Inject Code Distributed to All Managed Endpoints; Active Exploitation Confirmed May 2026

What is Trend Micro Apex One?

Trend Micro Apex One is an enterprise endpoint protection platform (EPP) used by organizations to centrally manage antivirus, EDR, and threat detection across all managed endpoints. It uses a central on-premise server that communicates with lightweight security agents installed on every managed workstation and server in the organization. The management server distributes policy updates, detection patterns, and configuration changes to agents automatically — making the server a high-value pivot point: an attacker who compromises the Apex One server gains the ability to push arbitrary changes to every protected endpoint in the network. Security product management servers are a recurring target precisely because they have trusted, authenticated channels to every endpoint they manage.

Overview

CVE-2026-34926 is a relative path traversal vulnerability in the Trend Micro Apex One on-premise server that allows an attacker with local administrative access to traverse outside an intended directory and overwrite a key table file on the server. By injecting malicious code into this table, the attacker causes the Apex One server to distribute the malicious code to all managed security agents deployed across the organization's endpoints. Despite a MEDIUM CVSS score (6.7), the Scope:Changed rating and the supply-chain-like propagation to agents across the environment explain the CISA KEV addition. JPCERT/CC confirmed active exploitation in the wild at the time of the May 2026 patch.

The cloud (SaaS) version of Apex One was patched server-side during April 2026 maintenance; on-premise customers need to apply the server and agent patches from Trend Micro's advisory KA-0023430. Trend Micro Vision One Endpoint Security – Standard Endpoint Protection (the successor product) is also affected on the agent component.

Affected Versions

Product Vulnerable Fixed
Apex One (On-Premise) Versions prior to May 2026 patch Apply KA-0023430 patch
Apex One as a Service (SaaS) Server patched April 2026; agent component affected Apply agent update from KA-0023430
Trend Micro Vision One — Standard Endpoint Protection Agent component affected Apply agent update from KA-0023430

Note: Specific build numbers are documented in the Trend Micro advisory KA-0023430, which requires a Trend Micro account to access.

Technical Details

CWE-23 (Relative Path Traversal). The Apex One on-premise server exposes functionality that allows administrators to interact with server-side key table files that define update and configuration data distributed to managed agents. A flaw in path handling allows a specially crafted input to traverse outside the intended directory using ../ sequences, reaching and overwriting a key table file that lies outside the expected directory boundary.

An attacker with local administrative access to the Apex One server (PR:H) exploits the traversal to overwrite the key table with attacker-controlled content. The Apex One server then distributes this modified table to all connected security agents as part of its normal update distribution process — causing every managed endpoint to receive and apply the injected malicious code.

The AC:H rating reflects that the attacker must be positioned with admin credentials on the server and must correctly craft the traversal path. The S:C (Scope:Changed) rating captures the cross-machine impact: exploitation on the server directly affects agents running on separate endpoint systems throughout the organization. In environments with hundreds or thousands of managed endpoints, a single server-side traversal translates into organization-wide endpoint compromise.

Discovery

No researcher has been publicly credited for discovering CVE-2026-34926. Trend Micro and JPCERT/CC both published advisories on 2026-05-21, and JPCERT's alert explicitly confirmed active in-the-wild exploitation, indicating the vulnerability was identified during incident response rather than through proactive research disclosure.

Exploitation Context

JPCERT/CC confirmed active exploitation of CVE-2026-34926 in attacks against Japanese organizations at the time of the advisory. CISA added it to KEV the same day. No specific threat actor, ransomware group, or nation-state has been publicly attributed.

The exploitation of security product management servers has become a common tactic for sophisticated attackers seeking broad endpoint access — compromising the management server provides a trusted, authenticated channel to every managed endpoint in the deployment, enabling lateral movement at scale without needing to exploit individual endpoints separately. This pattern has been observed with other endpoint security product servers in recent years.

Remediation

  1. Apply the Trend Micro patch from advisory KA-0023430 immediately — both server and agent components require updating.
  2. For Apex One as a Service customers: the server was patched during April 2026 maintenance; apply the agent update from KA-0023430 to complete remediation.
  3. Audit Apex One server access logs for evidence of directory traversal patterns or unexpected key table modifications.
  4. Review agent deployment logs across managed endpoints for any unexpected updates or configuration changes pushed from the server in recent weeks.
  5. Restrict administrative access to the Apex One management server to dedicated management networks; ensure the server is not internet-accessible.
  6. Apply the principle of least privilege to Apex One server administrator accounts — limit who can authenticate with admin-level access to the management console.

See Also

This CVE is part of a sustained pattern of Trend Micro Apex One management console vulnerabilities in CISA KEV spanning 2019–2026. See Attacking the Defenders: The Persistent Pattern of AV and EDR Products in CISA KEV for analysis of 18 KEV entries across Microsoft Defender, Trend Micro Apex One, McAfee, and Sophos.

Key Details

PropertyValue
CVE ID CVE-2026-34926
Vendor / Product Trend Micro — Apex One
NVD Published2026-05-21
NVD Last Modified2026-05-21
CVSS 3.1 Score6.7
CVSS 3.1 VectorCVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L
SeverityMEDIUM
CWE CWE-23 find similar ↗
CISA KEV Added2026-05-21
CISA KEV Deadline2026-06-04
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Local
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
Low

Required Action

CISA BOD 22-01 Deadline: 2026-06-04. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Timeline

DateEvent
2026-05-21Trend Micro publishes advisory KA-0023430 patching CVE-2026-34926; JPCERT/CC issues alert confirming active exploitation in the wild; CISA adds to KEV same day
2026-06-04CISA BOD 22-01 remediation deadline