Views:

Bulletin Date: May 23, 2025

CVE Vulnerability Identifiers: CVE-2025-48443

Platform: Microsoft Windows

CVSSv3 Scores: 6.7: AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

Severity Rating: Medium

Summary

Trend Micro has released a hotfix for the Trend Micro Password Manager for Windows family of consumer products which resolves a Link Following Local Privilege Escalation Vulnerability.

Affected Versions

PRODUCT AFFECTED VERSIONS PLATFORM LANGUAGE(S)
Trend Micro Password Manager 5.0.0.1266 and below Microsoft Windows English

Solution

PRODUCT UPDATED VERSION(S) PLATFORM LANGUAGE(S)
Trend Micro Password Manager 5.8.0.1330 Microsoft Windows English

Trend Micro has released an update via the product’s automatic update mechanism to resolve this issue. Your Trend Micro Password Manager program should receive the update automatically as long as your computer is connected to the Internet. Customers are advised to use the latest version when doing a fresh installation of the product.

Vulnerability Details

Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Local Privilege Escalation Vulnerability that could allow a local attacker to leverage this vulnerability to delete files in the context of an administrator when the administrator installs Trend Micro Password Manager.

Trend Micro has received no reports nor is aware of any actual attacks against the affected product related to this vulnerability at this time.

Acknowledgement

Trend Micro would like to thank the following individual for responsibly disclosing the issue and working with Trend Micro to help protect our customers:

  • Anonymous working with Trend Micro Zero Day Initiative

Additional Assistance

Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.

External Reference(s)

The following advisories may be found at Trend Micro's Zero Day Initiative Published Advisories site:

  • ZDI-CAN-25574
Add a comment