• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    VS Code extensions

    Critical Security Flaws Discovered in Four VS Code Extensions Affecting Millions

    AI in education

    AI Has Entered Schools—But What About Its Responsible Use?

    Advantest Cyberattack, Advantest, Cybersecurity Incident

    Advantest Cyberattack Triggers Ransomware Investigation Across Internal Network

    CVE-2026-2447

    Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147

    Responsible AI

    Responsible AI at Scale Demands Cyber Readiness, Experts at India AI Impact Summit Warn

    Ivanti EPMM, Reconnaissance

    Attackers Deploy Dormant Backdoors in Ivanti EPMM to Bypass Patching of Latest 0-Days

    CVE-2026-22769

    Zero-Day in Dell RecoverPoint Exploited by Chinese Hacker Group

    Cyber Essentials

    Think You’re Too Small to Be Hacked? NCSC Says Think Again

    CVE-2026-1490

    CleanTalk WordPress Plugin Vulnerability Puts 200,000 Sites at Risk

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    AI in education

    AI Has Entered Schools—But What About Its Responsible Use?

    Responsible AI

    Responsible AI at Scale Demands Cyber Readiness, Experts at India AI Impact Summit Warn

    Lockdown Mode, ChatGPT

    OpenAI’s New Enterprise Security Mode Locks Down ChatGPT Against Prompt Injection

    Cyber Essentials

    Think You’re Too Small to Be Hacked? NCSC Says Think Again

    Grok AI, Grok, Elon Musk, Case against X, Platform X,

    Ireland Opens GDPR Probe Into Grok’s AI-Generated Deepfakes of Children

    India AI Impact Summit 2026

    AI a Tool for Inclusion, Jobs and Global Cooperation: India AI Impact Summit 2026

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    AI-generated Content

    India Brings AI-Generated Content Under Formal Regulation with IT Rules Amendment

    IndiaAI Mission

    India Seeks Larger Role in Global AI and Deep Tech Development

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    VS Code extensions

    Critical Security Flaws Discovered in Four VS Code Extensions Affecting Millions

    AI in education

    AI Has Entered Schools—But What About Its Responsible Use?

    Advantest Cyberattack, Advantest, Cybersecurity Incident

    Advantest Cyberattack Triggers Ransomware Investigation Across Internal Network

    CVE-2026-2447

    Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147

    Responsible AI

    Responsible AI at Scale Demands Cyber Readiness, Experts at India AI Impact Summit Warn

    Ivanti EPMM, Reconnaissance

    Attackers Deploy Dormant Backdoors in Ivanti EPMM to Bypass Patching of Latest 0-Days

    CVE-2026-22769

    Zero-Day in Dell RecoverPoint Exploited by Chinese Hacker Group

    Cyber Essentials

    Think You’re Too Small to Be Hacked? NCSC Says Think Again

    CVE-2026-1490

    CleanTalk WordPress Plugin Vulnerability Puts 200,000 Sites at Risk

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    AI in education

    AI Has Entered Schools—But What About Its Responsible Use?

    Responsible AI

    Responsible AI at Scale Demands Cyber Readiness, Experts at India AI Impact Summit Warn

    Lockdown Mode, ChatGPT

    OpenAI’s New Enterprise Security Mode Locks Down ChatGPT Against Prompt Injection

    Cyber Essentials

    Think You’re Too Small to Be Hacked? NCSC Says Think Again

    Grok AI, Grok, Elon Musk, Case against X, Platform X,

    Ireland Opens GDPR Probe Into Grok’s AI-Generated Deepfakes of Children

    India AI Impact Summit 2026

    AI a Tool for Inclusion, Jobs and Global Cooperation: India AI Impact Summit 2026

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    AI-generated Content

    India Brings AI-Generated Content Under Formal Regulation with IT Rules Amendment

    IndiaAI Mission

    India Seeks Larger Role in Global AI and Deep Tech Development

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

Trend Micro Apex Central Vulnerabilities Patched in the May Bulletin

Trend Micro's May bulletin has addressed multiple vulnerabilities in Trend Micro Apex Central

Ashish Khaitan by Ashish Khaitan
September 20, 2023
in Firewall Daily, Vulnerabilities
0
Trend Micro Apex Central
636
SHARES
3.5k
VIEWS
Share on LinkedInShare on Twitter

Trend Micro’s May bulletin has addressed multiple vulnerabilities in Trend Micro Apex Central. The vulnerabilities, identified by CVE identifiers CVE-2023-32529 through CVE-2023-32537 and CVE-2023-32604 through CVE-2023-32605, affect the Windows platform. 

These vulnerabilities have been assigned severity ratings ranging from medium to high, with corresponding CVSS 3.0 scores ranging from 4.1 to 7.2. It is important for users to be aware of these vulnerabilities in order to take appropriate action and protect their systems.

Addressing multiple Apex Central vulnerabilities 

Trend Micro has promptly released Patch 4 (B6394) for Apex Central, which includes the necessary updates to address the identified vulnerabilities.

The updated version of Apex Central is now available for download from Trend Micro’s Download Center. It is recommended that customers obtain the latest version of the product to ensure that all known issues are resolved.

To ensure a seamless update process, customers are advised to visit Trend Micro’s Download Center to acquire any prerequisite software, such as Service Packs, before applying the provided solutions.

By following these steps, users can ensure a smooth transition to the latest version of Apex Central and take advantage of the enhanced security measures.

report-ad-banner

CVE-2023-32529 and CVE-2023-32530

Moreover, the first two vulnerabilities, CVE-2023-32529 and CVE-2023-32530, are SQL injection remote code execution vulnerabilities.

These vulnerabilities exist in vulnerable modules of Trend Micro Apex Central (on-premise), which, if exploited, could allow authenticated users to execute remote code through SQL injection.

It is crucial to note that an attacker must first obtain authentication on the target system to exploit these vulnerabilities successfully.

CVE-2023-32531 through CVE-2023-32535

Additionally, CVE-2023-32531 through CVE-2023-32535 encompass central cross-site scripting (XSS) remote code execution vulnerabilities.

Specifically, certain dashboard widgets on Trend Micro Apex Central (on-premise) are susceptible to XSS attacks.

These vulnerabilities may enable an attacker to execute remote code on affected servers. It is essential to address these vulnerabilities promptly to mitigate the associated risks.

CVE-2023-32536 to CVE-2023-32605

Furthermore, Trend Micro has also identified CVE-2023-32536, CVE-2023-32537, CVE-2023-32604, and CVE-2023-32605 as authenticated reflected XSS vulnerabilities.

These vulnerabilities stem from user input validation and sanitization issues in affected versions of Trend Micro Apex Central (on-premise). Exploiting these vulnerabilities requires an attacker to authenticate to Apex Central on the target system. 

Apex Central vulnerabilities and patching 

Additionally, reviewing remote access to critical systems and ensuring up-to-date policies and perimeter security are in place can provide an extra layer of defense. Trend Micro acknowledges the responsible disclosure of these vulnerabilities by security researchers. 

The company has expressed gratitude to Poh Jia Hao of STAR Labs SG Pte. Ltd. and Pankaj Kumar Thakur of Green Tick Nepal Pvt. Ltd. for working collaboratively to address these issues and safeguard customers’ interests.

Customers can refer to the advisories published by Trend Micro’s Zero Day Initiative to find more information regarding these vulnerabilities.

The advisories, namely ZDI-CAN-17688, ZDI-CAN-17690, ZDI-CAN-18872, ZDI-CAN-18871, ZDI-CAN-18876, ZDI-CAN-18874, and ZDI-CAN-18867, provide additional insights and guidance on these Apex Central vulnerabilities.

Vulnerability management: Users still play catch-up

Faulty vulnerability management has put numerous organizations worldwide under the threat posed by the Cl0p ransomware group, which has been using vulnerabilities in MOVEit Transfer to launch ransomware attacks on them.

Cl0p has previously used vulnerabilities in Fortra GoAnywhere MFT in February 2023 and the zero-day vulnerabilities in Accellion’s file-transfer software in December 2020.

A significant number of vulnerabilities reported in May by various organizations pose a significant security risk, with a majority being remotely exploitable.

A considerable portion of vulnerabilities went unnoticed by common vulnerability databases. Approximately 34 percent of the disclosed vulnerabilities in May were rated as high-to-critical severity, indicating the potential for significant security breaches.

Organizations must streamline their vulnerability management efforts by prioritizing actionable vulnerabilities classified as high severity.

By focusing on vulnerabilities that are remotely exploitable, have public exploits, and viable solutions, vulnerability management teams can potentially reduce their workload by nearly 88 percent, thereby enhancing overall cybersecurity posture.

There are several incidents where organizations suffered due to inadequate management of IT or OT vulnerabilities.

Examples include the NotPetya attack in 2017, which exploited vulnerabilities in unpatched or outdated software; the Triton/Trisis attack in 2017, which targeted a petrochemical plant’s safety systems; and the Colonial Pipeline attack in 2021, which exploited a compromised password and led to fuel shortages and disruptions.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Previous Post

Kisco Senior Living Data Breach Claimed by BlackByte Ransomware Group

Next Post

Cl0p Lists More MOVEit Hack Victims, Includes US and UK Government Agencies

Next Post
GOHSEP MOVEit Safety Steps MOVEit Hack

Cl0p Lists More MOVEit Hack Victims, Includes US and UK Government Agencies

Upcoming Webinar

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

VS Code extensions
Firewall Daily

Critical Security Flaws Discovered in Four VS Code Extensions Affecting Millions

February 19, 2026
AI in education
Cyber Essentials

AI Has Entered Schools—But What About Its Responsible Use?

February 19, 2026
Advantest Cyberattack, Advantest, Cybersecurity Incident
Firewall Daily

Advantest Cyberattack Triggers Ransomware Investigation Across Internal Network

February 19, 2026
CVE-2026-2447
Firewall Daily

Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147

February 19, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information