Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18565 | Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Local Privilege Escalation Vulnerability that could allow a local attacker to leverage this vulnerability to delete files in the context of an administrator when the administrator installs Trend Micro Password Manager. |
Wed, 27 Aug 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:windows:*:* |
Wed, 18 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Jun 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Local Privilege Escalation Vulnerability that could allow a local attacker to leverage this vulnerability to delete files in the context of an administrator when the administrator installs Trend Micro Password Manager. | |
| First Time appeared |
Trendmicro
Trendmicro password Manager |
|
| Weaknesses | CWE-64 | |
| CPEs | cpe:2.3:a:trendmicro:password_manager:5.0.0.1266:*:*:*:*:*:*:* | |
| Vendors & Products |
Trendmicro
Trendmicro password Manager |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: trendmicro
Published:
Updated: 2025-06-18T15:50:22.231Z
Reserved: 2025-05-21T14:10:09.619Z
Link: CVE-2025-48443
Updated: 2025-06-18T15:50:16.825Z
Status : Analyzed
Published: 2025-06-17T21:15:38.503
Modified: 2025-08-27T02:33:20.480
Link: CVE-2025-48443
No data.
OpenCVE Enrichment
No data.
EUVD