CVE-2025-52837

Trend Micro Password Manager (Consumer) version 5.8.0.1327 and below is vulnerable to a Link Following Privilege Escalation Vulnerability that could allow an attacker the opportunity to abuse symbolic links and other methods to delete any file/folder and achieve privilege escalation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:windows:*:*

History

03 Oct 2025, 00:48

Type Values Removed Values Added
CPE cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:windows:*:*
References () https://helpcenter.trendmicro.com/en-us/article/TMKA-12946 - () https://helpcenter.trendmicro.com/en-us/article/TMKA-12946 - Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-25-586/ - () https://www.zerodayinitiative.com/advisories/ZDI-25-586/ - Third Party Advisory
First Time Trendmicro password Manager
Trendmicro
CWE CWE-59

15 Jul 2025, 13:14

Type Values Removed Values Added
Summary
  • (es) Trend Micro Password Manager (Consumer) versión 5.8.0.1327 y anteriores es afectado por una vulnerabilidad de escalada de privilegios de seguimiento de enlaces que podría permitir a un atacante la oportunidad de abusar de enlaces simbólicos y otros métodos para eliminar cualquier archivo/carpeta y lograr una escalada de privilegios.

10 Jul 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-10 19:15

Updated : 2025-10-03 00:48


NVD link : CVE-2025-52837

Mitre link : CVE-2025-52837

CVE.ORG link : CVE-2025-52837


JSON object : View

Products Affected

trendmicro

  • password_manager
CWE
CWE-64

Windows Shortcut Following (.LNK)

CWE-59

Improper Link Resolution Before File Access ('Link Following')