CVE-2026-34926
MEDIUM KEVTrend Micro, Inc. TrendAI Apex One - Relative Path Traversal
Title source: ruleDescription
A directory traversal vulnerability in the Apex One (on-premise) server could allow a pre-authenticated local attacker to modify a key table on the server to inject malicious code to deploy to agents on affected installations. This vulnerability is only exploitable on the on-premise version of Apex One and a potential attacker must have access to the Apex One Server and already obtained administrative credentials to the server via some other method to exploit this vulnerability.
References (5)
Core 5
Core References
Third Party Advisory, US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-34926
Scores
CVSS v3
6.7
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
active
Automatable
no
Technical Impact
partial
Details
CISA KEV
2026-05-21
VulnCheck KEV
2026-05-21
CWE
CWE-23
Status
published
Products (2)
Trend Micro, Inc./TrendAI Apex One
2019 (14.0) - 14.0.0.17079
Trend Micro, Inc./TrendAI Apex One as a Service
SaaS - 14.0.20731
Published
May 21, 2026
KEV Added
May 21, 2026
Tracked Since
May 21, 2026