Critical CVEs in Focus: What You Need to Patch Now
This post highlights four high-severity CVEs—Trend Micro Apex One, Android GPU drivers, Apple WebKit, and Gigabyte firmware—and explains how to safeguard your systems now.

- Trend Micro Apex One Command Injection (CVE-2025-54948 / CVE-2025-54987)
- What's happening: Trend Micro has disclosed critical command injection vulnerabilities (CVE-2025-54948 & CVE-2025-54987) impacting its Apex One Management Console. These flaws allow for remote code execution in enterprise environments, and at least one active exploitation has already been observed.
- Action: While a patch is expected by mid-August, Trend Micro and Japan's CERT recommend immediately disabling the Remote Install Agent and restricting access to the console from untrusted networks.
- Google Fixes Qualcomm GPU Exploits in Android Update (CVE-2025-21479 & CVE-2025-27038)
- Overview: Google's August 2025 Android update includes patches for critical Qualcomm vulnerabilities– specifically CVE-2025-21479 (in the Graphics framework) and CVE-2025-27038 (in Adreno GPU drivers)– both linked to memory corruption and unauthorized command execution.
- Risk level: These flaws were added to CISA's Known Exploited Vulnerabilities list, with federal agencies mandated to patch by June 24, 2025.
- Recommendation: Update Android devices immediately to receive these critical fixes.
- Apple WebKit Zero-Day Under Attack (CVE-2025-6558)
- Summary: Apple's iOS 18.6 and macOS 13.6 updates include a fix for CVE-2025-6558–a WebKit zero-day vulnerability actively exploited in the wild.
- Action: Users should install the update immediately via their device settings to prevent unauthorized code execution.
- Gigabyte UEFI Firmware Flaws (CVE-2025-7026 / 7027 / 7028 / 7029)
- Details: Security firm Binarly identified four critical vulnerabilities in Gigabyte motherboard UEFI firmware. These SMM-level flaws can bypass Secure Boot, allowing attackers to install firmware-level backdoors. While no exploitation cases are yet reported, over 100 motherboard models are impacted.
- Mitigation: Users should update firmware via Gigabyte's support pages and verify Secure Boot remains enabled after the update.
ThreatGrid Takeaways
CVE | Key Action |
---|---|
Trend Micro Apex One | Disable Remote Install Agent; update as soon as patch is available |
Android GPU Exploits | Apply Android 2025-08 patches immediately |
Apple WebKit Zero-Day | Install iOS 18.6/macOS 13.6 updates |
Gigabyte Firmware Vulnerabilities | Flash latest BIOS/UEFI and validate Secure Boot |