Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Local Privilege Escalation Vulnerability that could allow a local attacker to leverage this vulnerability to delete files in the context of an administrator when the administrator installs Trend Micro Password Manager.
History

Wed, 27 Aug 2025 02:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:windows:*:*

Wed, 18 Jun 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Jun 2025 20:45:00 +0000

Type Values Removed Values Added
Description Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Local Privilege Escalation Vulnerability that could allow a local attacker to leverage this vulnerability to delete files in the context of an administrator when the administrator installs Trend Micro Password Manager.
First Time appeared Trendmicro
Trendmicro password Manager
Weaknesses CWE-64
CPEs cpe:2.3:a:trendmicro:password_manager:5.0.0.1266:*:*:*:*:*:*:*
Vendors & Products Trendmicro
Trendmicro password Manager
References
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: trendmicro

Published:

Updated: 2025-06-18T15:50:22.231Z

Reserved: 2025-05-21T14:10:09.619Z

Link: CVE-2025-48443

cve-icon Vulnrichment

Updated: 2025-06-18T15:50:16.825Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-17T21:15:38.503

Modified: 2025-08-27T02:33:20.480

Link: CVE-2025-48443

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.