CWE
400
Advisory Published
Updated

CVE-2021-25252

First published: Wed Mar 03 2021(Updated: )

Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.

Credit: security@trendmicro.com

Affected SoftwareAffected VersionHow to fix
Trend Micro Apex Central=2019
Microsoft Windows Operating System
Trend Micro Apex One=2019
Trend Micro Cloud Edge=5.0
Trend Micro Apex One
macOS
Trend Micro Deep Security Manager=10.0
Trend Micro Deep Security Manager=11.0
Trend Micro Deep Security Manager=12.0
Trend Micro Deep Security Manager=20.0
Trend Micro Control Manager=7.0
Trend Micro Deep Discovery Analyzer=5.1
Trend Micro Deep Discovery Email Inspector=2.5
Trend Micro Deep Discovery Inspector=3.8
Trend Micro InterScan Messaging Security Virtual Appliance=9.1
Trend Micro InterScan Web Security Virtual Appliance=6.5
Trend Micro OfficeScan Corporate Edition
Trend Micro PortalProtect=2.6
Trend Micro ScanMail for Microsoft Exchange=14.0
Trend Micro ScanMail for IBM Domino=5.8
Linux Kernel
Trend Micro ServerProtect=6.0
Trend Micro Smart Protection Server=5.8
EMC Celerra Network Attached Storage
Novell NetWare FTP Server
Trend Micro ServerProtect for Network Appliance Filers=5.8
NetApp Clustered Data ONTAP
Trend Micro Safe Lock=1.1
Trend Micro Apex One and Worry-Free Business Security=10.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2021-25252?

    CVE-2021-25252 is a vulnerability in Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) that can be exploited by an attacker to cause a denial-of-service or system freeze.

  • Which software are affected by CVE-2021-25252?

    Trend Micro's Apex Central 2019, Trend Micro's Apex One and Worry-Free Business Security 2019, Trend Micro's Cloud Edge 5.0, Trend Micro's Deep Security 10.0/11.0/12.0/20.0, Trend Micro's Control Manager 7.0, Trend Micro's Deep Discovery Analyzer 5.1, Trend Micro's Deep Discovery Email Inspector 2.5, Trend Micro's Deep Discovery Inspector 3.8, Trend Micro's Interscan Messaging Security Virtual Appliance 9.1, Trend Micro's Interscan Web Security Virtual Appliance 6.5, Trend Micro's Officescan, Trend Micro's Portal Protect 2.6, Trend Micro's Scanmail 14.0, Trend Micro's Scanmail for IBM Domino 5.8, Trend Micro's Serverprotect for Storage 6.0, Trend Micro's Serverprotect 5.8, Trend Micro's Safe Lock 1.1, Trend Micro's Worry-free Business Security are affected by CVE-2021-25252.

  • How severe is CVE-2021-25252?

    CVE-2021-25252 has a severity rating of 5.5 (medium).

  • How can CVE-2021-25252 be fixed?

    To fix CVE-2021-25252, it is recommended to apply the latest security patches or updates provided by Trend Micro.

  • Where can I find more information about CVE-2021-25252?

    You can find more information about CVE-2021-25252 on the Trend Micro website at the following link: [https://success.trendmicro.com/solution/000285675](https://success.trendmicro.com/solution/000285675)

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203