Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Local Privilege Escalation Vulnerability that could allow a local attacker to leverage this vulnerability to delete files in the context of an administrator when the administrator installs Trend Micro Password Manager.
References
| Link | Resource |
|---|---|
| https://helpcenter.trendmicro.com/en-us/article/TMKA-12917 | Vendor Advisory |
| https://www.zerodayinitiative.com/advisories/ZDI-25-361/ | Third Party Advisory |
Configurations
History
27 Aug 2025, 02:33
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:windows:*:* | |
| Summary |
|
|
| First Time |
Trendmicro
Trendmicro password Manager |
|
| References | () https://helpcenter.trendmicro.com/en-us/article/TMKA-12917 - Vendor Advisory | |
| References | () https://www.zerodayinitiative.com/advisories/ZDI-25-361/ - Third Party Advisory |
17 Jun 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-17 21:15
Updated : 2025-08-27 02:33
NVD link : CVE-2025-48443
Mitre link : CVE-2025-48443
CVE.ORG link : CVE-2025-48443
JSON object : View
Products Affected
trendmicro
- password_manager
CWE
CWE-64
Windows Shortcut Following (.LNK)
