EUVD-2025-18562

| CVE-2025-49384 HIGH
2025-06-17 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 22:15 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 22:15 euvd
EUVD-2025-18562
CVE Published
Jun 17, 2025 - 21:15 nvd
HIGH 7.8

Description

Trend Micro Security 17.8 (Consumer) is vulnerable to a link following local privilege escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own.

Analysis

Local privilege escalation vulnerability in Trend Micro Security 17.8 (Consumer) that exploits improper link following (symlink/junction attack) to allow a low-privileged local attacker to delete privileged Trend Micro system files without user interaction. This vulnerability carries a CVSS 7.8 high severity rating due to high impact on confidentiality, integrity, and availability; however, real-world exploitability depends on KEV status, EPSS probability data, and proof-of-concept availability, which are not provided in the available intelligence.

Technical Context

The vulnerability stems from CWE-64 (Improper Link Following), a classic privilege escalation weakness where an application fails to properly validate symbolic links (symlinks) or Windows junction points before performing file operations with elevated privileges. Trend Micro Security 17.8 (Consumer) likely performs maintenance, cleanup, or update operations with SYSTEM/elevated privileges without canonicalizing paths or checking for link attacks. An attacker with local user access can create malicious symbolic links pointing to protected Trend Micro files or system directories, causing the privileged Trend Micro process to unintentionally delete or modify critical security enforcement files. The CWE-64 weakness is well-established in privilege escalation attack chains and commonly exploited in Windows environments where file permissions and link-following semantics can be abused. CPE for affected product: cpe:2.3:a:trendmicro:security:17.8:*:*:*:consumer:*:*:* (inferred from description).

Affected Products

- vendor: Trend Micro; product: Security; version: 17.8; edition: Consumer; vulnerability_type: Local Privilege Escalation via Symlink Following; cpe: cpe:2.3:a:trendmicro:security:17.8:*:*:*:consumer:*:*:*; impact: Unintentional deletion of privileged Trend Micro system files and potential denial of service

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +39
POC: 0

Share

EUVD-2025-18562 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy