Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-48443
Analyzed
More InfoOfficial Page
Source-security@trendmicro.com
View Known Exploited Vulnerability (KEV) details
Published At-17 Jun, 2025 | 21:15
Updated At-27 Aug, 2025 | 02:33

Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Local Privilege Escalation Vulnerability that could allow a local attacker to leverage this vulnerability to delete files in the context of an administrator when the administrator installs Trend Micro Password Manager.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.7MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Primary3.16.6MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
CPE Matches

Trend Micro Incorporated
trendmicro
>>password_manager>>Versions before 5.8.0.1330(exclusive)
cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:windows:*:*
Weaknesses
CWE IDTypeSource
CWE-64Secondarysecurity@trendmicro.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://helpcenter.trendmicro.com/en-us/article/TMKA-12917security@trendmicro.com
Vendor Advisory
https://www.zerodayinitiative.com/advisories/ZDI-25-361/security@trendmicro.com
Third Party Advisory
Change History
0Changes found

Details not found