CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
Trend Micro Security 17.8 (Consumer) is vulnerable to a link following local privilege escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own.
Analysis
Local privilege escalation vulnerability in Trend Micro Security 17.8 (Consumer) that exploits improper link following (symlink/junction attack) to allow a low-privileged local attacker to delete privileged Trend Micro system files without user interaction. This vulnerability carries a CVSS 7.8 high severity rating due to high impact on confidentiality, integrity, and availability; however, real-world exploitability depends on KEV status, EPSS probability data, and proof-of-concept availability, which are not provided in the available intelligence.
Technical Context
The vulnerability stems from CWE-64 (Improper Link Following), a classic privilege escalation weakness where an application fails to properly validate symbolic links (symlinks) or Windows junction points before performing file operations with elevated privileges. Trend Micro Security 17.8 (Consumer) likely performs maintenance, cleanup, or update operations with SYSTEM/elevated privileges without canonicalizing paths or checking for link attacks. An attacker with local user access can create malicious symbolic links pointing to protected Trend Micro files or system directories, causing the privileged Trend Micro process to unintentionally delete or modify critical security enforcement files. The CWE-64 weakness is well-established in privilege escalation attack chains and commonly exploited in Windows environments where file permissions and link-following semantics can be abused. CPE for affected product: cpe:2.3:a:trendmicro:security:17.8:*:*:*:consumer:*:*:* (inferred from description).
Affected Products
- vendor: Trend Micro; product: Security; version: 17.8; edition: Consumer; vulnerability_type: Local Privilege Escalation via Symlink Following; cpe: cpe:2.3:a:trendmicro:security:17.8:*:*:*:consumer:*:*:*; impact: Unintentional deletion of privileged Trend Micro system files and potential denial of service
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18562