Trend Micro Protection & Detection Against Exploitation
First and foremost, it is always recommended that users apply vendor-specific patches when they are available. As mentioned above, RSC users with affected components should upgrade as soon as possible.
Trend Vision Oneā¢
Trend Micro has added Time-Critical Vulnerability alert in the Trend Vision One Executive Dashboard that will be continually updated with additional information related to prevention and detection as it becomes available.
In addition to the vendor patch(s) that should be applied, Trend Micro has released some detection rules and filters that may help provide additional protection and detection of malicious assets associated with this vulnerability.
Trend Vision One - Endpoint Security and Deep Security IPS Rules
- 1012497 - React Server Remote Code Execution Vulnerability (CVE-2025-55182 and CVE-2025-66478) - 1
- 1012494 - React Server Remote Code Execution Vulnerability (CVE-2025-55182 and CVE-2025-66478) - 2
Trend Cloud One - Network Security & TippingPoint Digital Vaccine (DV) Filters
- 46746: HTTP: React Server Components Code Execution Vulnerability
- 42590: HTTP: Suspicious HTTP Request Containing NodeJS Command Execution
Trend Micro Deep Discovery Inspector (DDI) Rules
- 5595: CVE-2025-55182 - RSC NEXTJS RCE Exploit - HTTP(Request)
Trend Research will continue to monitor and update this threat as more information becomes available.
