Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Local Privilege Escalation Vulnerability that could allow a local attacker to leverage this vulnerability to delete files in the context of an administrator when the administrator installs Trend Micro Password Manager.
References
Link | Resource |
---|---|
https://helpcenter.trendmicro.com/en-us/article/TMKA-12917 | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-25-361/ | Third Party Advisory |
Configurations
History
27 Aug 2025, 02:33
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:windows:*:* | |
Summary |
|
|
References | () https://helpcenter.trendmicro.com/en-us/article/TMKA-12917 - Vendor Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-25-361/ - Third Party Advisory | |
First Time |
Trendmicro password Manager
Trendmicro |
17 Jun 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-17 21:15
Updated : 2025-08-27 02:33
NVD link : CVE-2025-48443
Mitre link : CVE-2025-48443
CVE.ORG link : CVE-2025-48443
JSON object : View
Products Affected
trendmicro
- password_manager
CWE
CWE-64
Windows Shortcut Following (.LNK)