{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Trend Vision One Endpoint Standard Endpoint Protection versions ant\u00e9rieures \u00e0 14.0.20315","product":{"name":"Apex One","vendor":{"name":"Trend Micro","scada":false}}},{"description":"Apex One versions ant\u00e9rieures \u00e0 CP Build 14136","product":{"name":"Apex One","vendor":{"name":"Trend Micro","scada":false}}},{"description":"Apex One as a Service versions ant\u00e9rieures \u00e0 14.0.20315","product":{"name":"Apex One","vendor":{"name":"Trend Micro","scada":false}}}],"affected_systems_content":"","content":"## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des correctifs (cf. section Documentation).","cves":[{"name":"CVE-2025-71216","url":"https://www.cve.org/CVERecord?id=CVE-2025-71216"},{"name":"CVE-2025-71217","url":"https://www.cve.org/CVERecord?id=CVE-2025-71217"},{"name":"CVE-2025-71214","url":"https://www.cve.org/CVERecord?id=CVE-2025-71214"},{"name":"CVE-2025-71212","url":"https://www.cve.org/CVERecord?id=CVE-2025-71212"},{"name":"CVE-2025-54948","url":"https://www.cve.org/CVERecord?id=CVE-2025-54948"},{"name":"CVE-2025-71215","url":"https://www.cve.org/CVERecord?id=CVE-2025-71215"},{"name":"CVE-2025-71213","url":"https://www.cve.org/CVERecord?id=CVE-2025-71213"},{"name":"CVE-2025-71210","url":"https://www.cve.org/CVERecord?id=CVE-2025-71210"},{"name":"CVE-2025-71211","url":"https://www.cve.org/CVERecord?id=CVE-2025-71211"},{"name":"CVE-2025-54987","url":"https://www.cve.org/CVERecord?id=CVE-2025-54987"}],"links":[],"reference":"CERTFR-2026-AVI-0206","revisions":[{"description":"Version initiale","revision_date":"2026-02-25T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Trend Micro. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et une \u00e9l\u00e9vation de privil\u00e8ges.","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Trend Micro","vendor_advisories":[{"published_at":"2026-02-24","title":"Bulletin de s\u00e9curit\u00e9 Trend Micro KA-0022458","url":"https://success.trendmicro.com/en-US/solution/KA-0022458"}]}
