Pattern Micro has launched safety updates to deal with a number of critical-severity distant code execution and authentication bypass vulnerabilities that impression its Apex Central and Endpoint Encryption (TMEE) PolicyServer merchandise.
The safety vendor underlines that it has seen no proof of energetic exploitation within the wild for any of them. Nevertheless, fast software of the safety updates is beneficial to deal with the dangers.
Pattern Micro Endpoint Encryption PolicyServer is a central administration server for Pattern Micro Endpoint Encryption (TMEE), offering full disk encryption and detachable media encryption for Home windows-based endpoints.
The product is utilized in enterprise environments in regulated industries the place compliance with knowledge safety requirements is essential.
With the newest replace, Pattern Micro addressed the next high-severity and demanding flaws:
CVE-2025-49212 – A pre-authentication distant code execution flaw brought on by insecure deserialization within the PolicyValueTableSerializationBinder class. Distant attackers can exploit it to execute arbitrary code as SYSTEM with out requiring login
CVE-2025-49213 – A pre-authentication distant code execution vulnerability within the PolicyServerWindowsService class, stemming from deserialization of untrusted knowledge. Attackers can run arbitrary code as SYSTEM with no authentication required
CVE-2025-49216 – An authentication bypass flaw within the DbAppDomain service on account of a damaged auth implementation. Distant attackers can totally bypass login and carry out admin-level actions with out credentials
CVE-2025-49217 – A pre-authentication RCE vulnerability within the ValidateToken technique, triggered by unsafe deserialization. Whereas barely tougher to use, it nonetheless permits unauthenticated attackers to run code as SYSTEM
It ought to be famous that whereas Pattern Micro’s safety bulletin for Endpoint Encryption PolicyServer lists all 4 vulnerabilities above as essential, ZDI’s advisory asessed CVE-2025-49217 as being a high-severity vulnerability.
Further points addressed by the newest model of Endpoint Encryption PolicyServer inlcude 4 extra high-severity vulnerabilities (e.g. SQL injection and privileges escalation points).
All the vulnerabilities had been addressed in model 6.0.0.4013 (Patch 1 Replace 6). The issues impression all variations as much as the newest, and there aren’t any mitigations or workarounds for them.
A second set of issues that Pattern Micro addressed impacts Apex Central, a centralized safety administration console used for monitoring, configuring, and managing a number of Pattern Micro merchandise and safety brokers throughout a corporation.
Each points are critical-severity, pre-authentication distant code execution flaws:
CVE-2025-49219 – A pre-authentication RCE flaw within the GetReportDetailView technique of Apex Central brought on by insecure deserialization. Exploiting this permits unauthenticated attackers to execute code within the context of NETWORK SERVICE. (CVSS 9.8)
CVE-2025-49220 – A pre-auth RCE in Apex Central within the ConvertFromJson technique. Improper enter validation throughout deserialization lets attackers execute arbitrary code remotely with out authentication. (CVSS 9.8)
The problems had been mounted in Patch B7007 for Apex Central 2019 (on premise), whereas they’re routinely utilized on backend for Apex Central as a Service.
Patching used to imply advanced scripts, lengthy hours, and infinite hearth drills. Not anymore.
On this new information, Tines breaks down how trendy IT orgs are leveling up with automation. Patch quicker, scale back overhead, and give attention to strategic work — no advanced scripts required.