Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18562 | Trend Micro Security 17.8 (Consumer) is vulnerable to a link following local privilege escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own. |
| Link | Providers |
|---|---|
| https://helpcenter.trendmicro.com/en-us/article/TMKA-11112 |
|
Tue, 26 Aug 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows |
|
| CPEs | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Microsoft
Microsoft windows |
Wed, 18 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Jun 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Trend Micro Security 17.8 (Consumer) is vulnerable to a link following local privilege escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own. | |
| First Time appeared |
Trendmicro
Trendmicro maximum Security 2022 |
|
| Weaknesses | CWE-64 | |
| CPEs | cpe:2.3:a:trendmicro:maximum_security_2022:17.8:*:*:*:*:*:*:* | |
| Vendors & Products |
Trendmicro
Trendmicro maximum Security 2022 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: trendmicro
Published:
Updated: 2025-06-18T15:42:37.957Z
Reserved: 2025-06-04T14:20:26.485Z
Link: CVE-2025-49384
Updated: 2025-06-18T15:42:15.212Z
Status : Analyzed
Published: 2025-06-17T21:15:39.810
Modified: 2025-08-26T19:39:32.237
Link: CVE-2025-49384
No data.
OpenCVE Enrichment
No data.
EUVD