CVE-2025-48443

Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Local Privilege Escalation Vulnerability that could allow a local attacker to leverage this vulnerability to delete files in the context of an administrator when the administrator installs Trend Micro Password Manager.
Configurations

Configuration 1 (hide)

cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:windows:*:*

History

27 Aug 2025, 02:33

Type Values Removed Values Added
CPE cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:windows:*:*
Summary
  • (es) Trend Micro Password Manager (Consumer) versión 5.0.0.1266 y anteriores es afectado por una vulnerabilidad de escalada de privilegios locales siguiendo un enlace que podría permitir que un atacante local aproveche esta vulnerabilidad para eliminar archivos en el contexto de un administrador cuando el administrador instala Trend Micro Password Manager.
References () https://helpcenter.trendmicro.com/en-us/article/TMKA-12917 - () https://helpcenter.trendmicro.com/en-us/article/TMKA-12917 - Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-25-361/ - () https://www.zerodayinitiative.com/advisories/ZDI-25-361/ - Third Party Advisory
First Time Trendmicro password Manager
Trendmicro

17 Jun 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-17 21:15

Updated : 2025-08-27 02:33


NVD link : CVE-2025-48443

Mitre link : CVE-2025-48443

CVE.ORG link : CVE-2025-48443


JSON object : View

Products Affected

trendmicro

  • password_manager
CWE
CWE-64

Windows Shortcut Following (.LNK)