EUVD-2025-27793

| CVE-2025-30641 HIGH
2025-06-17 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 22:15 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 22:15 euvd
EUVD-2025-27793
CVE Published
Jun 17, 2025 - 21:15 nvd
HIGH 7.8

Description

A link following vulnerability in the anti-malware solution portion of Trend Micro Deep Security 20.0 agents could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Analysis

Link following (symlink) vulnerability in Trend Micro Deep Security 20.0 agent's anti-malware component that enables local privilege escalation. An attacker with low-privileged code execution can exploit this to gain elevated system privileges (confidentiality, integrity, and availability impact). While no public exploit or active exploitation in the wild has been confirmed, the CVSS 7.8 score and low attack complexity indicate this poses a significant risk to organizations running vulnerable versions.

Technical Context

This vulnerability exploits CWE-59 (Improper Link Resolution Before File Access, aka 'Link Following'), a classic privilege escalation flaw where a privileged process follows attacker-controlled symbolic links or hard links without proper validation. In Trend Micro Deep Security's anti-malware engine, the affected code likely performs file operations (scanning, logging, or remediation actions) with elevated privileges while failing to verify that file paths have not been redirected via symlinks to sensitive system locations (/etc/sudoers, /root/.ssh, kernel modules, etc.). The vulnerability is specific to Trend Micro Deep Security version 20.0 agents, which are typically installed with system/root privileges. The anti-malware module's file handling during scan operations or threat remediation is the likely attack surface. CPE identifier would be: cpe:2.3:a:trendmicro:deep_security:20.0:*:*:*:*:*:*:*

Affected Products

Trend Micro Deep Security Agent version 20.0 (all patch levels unless specified otherwise in vendor advisories). The vulnerability affects both on-premises and cloud-based deployments where the agent runs with elevated privileges. The product is commonly deployed across Windows, Linux, and macOS endpoints. CPE: cpe:2.3:a:trendmicro:deep_security:20.0:*:*:*:*:*:*:* . Administrators should consult the official Trend Micro Security Advisory for Deep Security to confirm exact patch availability and affected sub-versions (20.0.0, 20.0.1, etc.).

Remediation

Immediate remediation: (1) Apply the latest Trend Micro Deep Security Agent patch beyond version 20.0; Trend Micro typically releases patches in the 20.0.x.x sequence or recommends upgrading to version 21.x or later. Check the official Trend Micro Deep Security release notes and security advisory portal for specific patched versions. (2) Interim mitigation: Restrict local user account privileges and limit code execution contexts for untrusted users on systems running Deep Security 20.0. Implement file system access controls to prevent unprivileged users from creating symlinks in directories where the Deep Security agent writes logs or temporary files (typically /var/log, /tmp, /var/tmp on Linux). (3) Monitor: Enable audit logging for symlink creation and privilege escalation attempts. (4) Vendor advisory: Review Trend Micro's official CVE-2025-30641 advisory for patch download links and validation checksums.

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +39
POC: 0

Share

EUVD-2025-27793 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy