CVE-2025-49214

Severity
8.8HIGH
EPSS
3.9%
top 11.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 17

Description

An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a post-authentication remote code execution on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

🔴Vulnerability Details

2
CVEList
CVE-2025-49214: An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a post-authentication remote code execution on2025-06-17
GHSA
GHSA-f5jf-ffmh-7gfq: An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a post-authentication remote code execution on2025-06-17

📋Vendor Advisories

1
Microsoft
QUIC in HAProxy 3.1.x before 3.1-dev7, 3.0.x before 3.0.5, and 2.9.x before 2.9.11 allows opening a 0-RTT session with a spoofed IP address. This can bypass the IP allow/block list functionality.2024-10-08
CVE-2025-49214 (HIGH CVSS 8.8) | An insecure deserialization operati | cvebase.io