CERT-In Vulnerability Note reveals serious flaws in Ivanti, Trend Micro, Apache Kafka, and SAP products.
The Indian Computer Emergency Response Team (CERT-In) has issued a series of high—and critical-severity alerts through its CERT-In Vulnerability Note platform, warning enterprises and individuals about newly discovered security flaws in several widely used software products. These include Ivanti Workspace Control, Trend Micro’s endpoint security tools, Apache Kafka, and multiple SAP systems.
One of the most pressing concerns highlighted in the CERT-In Vulnerability Note CIVN-2025-0128 pertains to Ivanti Workspace Control (IWC), a software suite designed for secure user workspace management. The vulnerabilities assigned CVEs – CVE-2025-5353, CVE-2025-22463, and CVE-2025-22455 – impact version 10.19.0.0 and earlier.
These security flaws are due to improper credential storage practices, including the use of hardcoded encryption keys. This design flaw potentially allows authenticated low-privileged users to decrypt sensitive environment and SQL database credentials.
CERT-In’s assessment labels the vulnerabilities as “HIGH” risk, citing the potential for unauthorized access to critical systems and disclosure of confidential data.
Ivanti has released security advisories and patches, urging users to immediately apply updates to mitigate these risks. Details and remediation steps are available on the vendor’s official forum.
The CERT-In Vulnerability Note CIVN-2025-0127, marked CRITICAL, highlights multiple zero-day vulnerabilities in Trend Micro Apex One and Apex Central—both on-premises and SaaS versions. These include risks of remote code execution, privilege escalation, and improper access control, affecting nearly all deployment models.
CERT-In warned: “These vulnerabilities present a high risk of complete system compromise, data theft, and unauthorized administrative access.” Trend Micro has responded to the vulnerabilities, publishing fixes and detailed guidance through its support portal.
Another critical vulnerability alert under CERT-In Vulnerability Note CIVN-2025-0126 affects Apache Kafka, an essential data streaming platform used globally.
The flaws impact versions:
These vulnerabilities arise due to misconfigurations in the JAAS JndiLoginModule and LdapLoginModule, and improper values in JVM system properties.
CERT-In’s analysis suggests attackers could exploit these to “take full control over the Kafka environment or bring services to a halt.” Administrators are strongly advised to install the latest patches from the Apache Kafka CVE list.
Rounding off the list, CERT-In issued Advisory CIAD-2025-0022, highlighting a slew of vulnerabilities across SAP enterprise software suites. These include:
Severity levels range from medium to critical, with associated risks such as:
Notably, CVE-2025-42980, CVE-2025-42903, and CVE-2025-23192 represent the most dangerous flaws, potentially allowing attackers to bypass authentication and inject malicious code.
CERT-In cautioned: “SAP environments could be vulnerable to targeted attacks, data breaches, and operational outages unless timely patches are applied.”
Full patch details and remediation plans are available on SAP’s security portal.
As cyberattacks continue to grow, the latest CERT-In Vulnerability Notes reinforce the importance of prompt patch management, vigilant network monitoring, and strict access control. Organizations using any of the affected software solutions—Ivanti, Trend Micro, Apache Kafka, or SAP—are urged to:
Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.