Apex One dir traversal exploited in wild (CVE-2026-34926)
CVE-2026-34926
CVE-2026-34926: Apex One on-premise directory traversal lets local admins inject malicious agents. Actively exploited; patch or apply mitigations now.
Actively exploited in the wild - CVE-2026-34926 is a medium-severity directory traversal vulnerability in the Trend Micro Apex One (on-premise) server that lets a local attacker with administrative credentials modify a key table, enabling injection of malicious code deployed to all managed agents. Trend Micro has released a security patch; apply immediately.
Overview
CVE-2026-34926 is a directory traversal flaw in the Trend Micro Apex One server, specifically in the on-premise deployment. The vulnerability allows a pre-authenticated local attacker who already has administrative access to the Apex One server to traverse the filesystem and modify a critical key table on the server. This modification enables the attacker to inject malicious code that subsequently gets deployed to all Apex One agents managed by the compromised server.
While the attacker requires existing administrative credentials obtained through another method (such as credential theft or another vulnerability), the exploitation is facilitated by the fact that the server handles the traversal without proper validation. Once the key table is compromised, the injected code is pushed as a legitimate update to all connected agents, effectively turning a single-server compromise into a widespread client infection.
Impact: Successful exploitation grants the attacker the ability to execute arbitrary code on every managed Apex One agent endpoint, potentially compromising the entire network of protected devices.
Affected Versions: Trend Micro Apex One (on-premise) - exact version ranges should be confirmed from the vendor advisory.
Remediation
- Apply the official patch - Trend Micro has released a security update addressing CVE-2026-34926. Install the latest Apex One (on-premise) patch from the vendor’s support portal.
- Restrict local administrative access - Ensure that only trusted, authorized personnel have local administrative credentials on the Apex One server. Enforce multi-factor authentication for server access where feasible.
- Monitor agent deployment logs - Review Apex One logs for any unusual or unauthorized deployment packages pushed to agents, particularly those outside of normal update schedules.
- Harden the server - Limit network exposure of the Apex One server to only necessary management machines. Use endpoint detection and response (EDR) tools to monitor for post-exploitation activity.
Security Insight
This vulnerability represents a recurring pattern in endpoint management solutions: a compromise of the management server leads directly to the compromise of all managed agents. The requirement for prior administrative access does not reduce the real-world risk - attackers who breach an Apex One server via a separate vector (e.g., CVE-2026-34927, an unauthenticated RCE in the same server) can chain these vulnerabilities to bypass the need for existing credentials entirely. Organizations should treat on-premise security management consoles as Tier-0 assets and apply the same isolation and monitoring as domain controllers.
For the latest threat intelligence, see our cybersecurity news and data breach reports.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible...
pyLoad is a free and open-source download manager written in Python. From version 0.5.0b3.dev13 to 0.5.0b3.dev96, the edit_package() function implements insufficient sanitization for the pack_folder p...
A malicious user can manipulate the parameters.pathPattern to create PersistentVolumes in arbitrary locations on the host node, potentially overwriting sensitive files or gaining access to unintended ...
Xerte Online Toolkits versions 3.15 and earlier contain an incomplete input validation vulnerability in the elFinder connector endpoint that fails to block PHP-executable extensions .php4 due to an in...