CVE-2025-53503

| EUVD-2025-21043 HIGH
2025-07-10 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 16, 2026 - 06:52 euvd
EUVD-2025-21043
Analysis Generated
Mar 16, 2026 - 06:52 vuln.today
CVE Published
Jul 10, 2025 - 19:15 nvd
HIGH 7.8

Description

Trend Micro Cleaner One Pro is vulnerable to a Privilege Escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own.

Analysis

CVE-2025-53503 is a privilege escalation vulnerability in Trend Micro Cleaner One Pro that allows a local attacker with low privileges to delete critical Trend Micro system files, potentially including the security software itself. The CVSS 7.8 score reflects high impact across confidentiality, integrity, and availability. No public exploit code or active exploitation in the wild has been confirmed at this time, but the vulnerability requires only low privileges and no user interaction, making it a material risk for environments running this product.

Technical Context

This vulnerability is rooted in CWE-64 (Improper Protection of Mass Assignment), which typically involves insufficient validation of file operations and access controls. Trend Micro Cleaner One Pro, a system optimization and security utility, likely fails to properly validate or restrict file deletion operations when invoked by low-privileged local users. The flaw allows an attacker to leverage the application's elevated execution context (or inadequate privilege boundary enforcement) to delete files outside the intended scope, including privileged Trend Micro system files. This represents a failure in proper privilege compartmentalization and file-based access control enforcement within the application's cleanup/deletion routines.

Affected Products

Trend Micro Cleaner One Pro (specific vulnerable version range not disclosed in available data; likely recent versions prior to patching). Users should check Trend Micro's official advisory for exact version boundaries. The product is commonly deployed on Windows consumer and small-business systems. CPE data for this specific CVE was not provided; however, the product would typically be referenced as 'cpe:2.3:a:trendmicro:cleaner_one_pro:*:*:*:*:*:windows:*:*' or similar. Consult Trend Micro's security advisory or product documentation for definitive version information.

Remediation

1. **Immediate patch**: Apply the latest version of Trend Micro Cleaner One Pro from Trend Micro's official website or through the application's built-in update mechanism. 2. **Verify patch availability**: Check Trend Micro's security advisory page for CVE-2025-53503 to confirm availability and version numbers. 3. **Workaround (if patch unavailable)**: Restrict local system access and disable Trend Micro Cleaner One Pro file deletion features for non-administrator accounts if the application allows granular permission controls. 4. **Detection**: Monitor system event logs for unexpected file deletions of Trend Micro-related system files (typically in Program Files\Trend Micro). 5. **Rollback**: If patching is not immediately possible, consider temporarily uninstalling or disabling the application and relying on alternative system optimization tools.

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +39
POC: 0

Share

CVE-2025-53503 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy