Home

Description

A directory traversal vulnerability in the Apex One (on-premise) server could allow a pre-authenticated local attacker to modify a key table on the server to inject malicious code to deploy to agents on affected installations. This vulnerability is only exploitable on the on-premise version of Apex One and a potential attacker must have access to the Apex One Server and already obtained administrative credentials to the server via some other method to exploit this vulnerability.

PUBLISHED Reserved 2026-03-31 | Published 2026-05-21 | Updated 2026-05-21 | Assigner trendmicro




MEDIUM: 6.7CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L

Problem types

CWE-23: Relative Path Traversal

Product status

2019 (14.0) (semver) before 14.0.0.17079
affected

SaaS (semver) before 14.0.20731
affected

References

www.cisa.gov/...erabilities-catalog?field_cve=CVE-2026-34926 government-resource

success.trendmicro.com/en-US/solution/KA-0023430

success.trendmicro.com/ja-JP/solution/KA-0022974

jvn.jp/en/vu/JVNVU90583059/

www.jpcert.or.jp/english/at/2026/at260014.html

cve.org (CVE-2026-34926)

nvd.nist.gov (CVE-2026-34926)

Download JSON