CVE-2025-48443

Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Local Privilege Escalation Vulnerability that could allow a local attacker to leverage this vulnerability to delete files in the context of an administrator when the administrator installs Trend Micro Password Manager.
Configurations

Configuration 1 (hide)

cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:windows:*:*

History

27 Aug 2025, 02:33

Type Values Removed Values Added
References () https://helpcenter.trendmicro.com/en-us/article/TMKA-12917 - () https://helpcenter.trendmicro.com/en-us/article/TMKA-12917 - Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-25-361/ - () https://www.zerodayinitiative.com/advisories/ZDI-25-361/ - Third Party Advisory
CPE cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:windows:*:*
First Time Trendmicro
Trendmicro password Manager

18 Jun 2025, 13:47

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-17 21:15

Updated : 2025-08-27 02:33


NVD link : CVE-2025-48443

Mitre link : CVE-2025-48443

CVE.ORG link : CVE-2025-48443


JSON object : View

Products Affected

trendmicro

  • password_manager
CWE
CWE-64

Windows Shortcut Following (.LNK)