ID

VAR-202507-0240


CVE

CVE-2025-52521


TITLE

Trend Micro Maximum Security Link Following Local Privilege Escalation Vulnerability

Trust: 0.7

sources: ZDI: ZDI-25-585

DESCRIPTION

Trend Micro Security 17.8 (Consumer) is vulnerable to a link following local privilege escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the Regain Disk Space functionality. By creating a junction, an attacker can abuse the Platinum Host Service to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM

Trust: 1.53

sources: NVD: CVE-2025-52521 // ZDI: ZDI-25-585

AFFECTED PRODUCTS

vendor:trendmicromodel:maximum security 2022scope:eqversion:17.8

Trust: 1.0

vendor:trend micromodel:maximum securityscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-25-585 // NVD: CVE-2025-52521

CVSS

SEVERITY

CVSSV2

CVSSV3

security@trendmicro.com: CVE-2025-52521
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2025-52521
value: HIGH

Trust: 1.0

ZDI: CVE-2025-52521
value: HIGH

Trust: 0.7

security@trendmicro.com: CVE-2025-52521
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-52521
baseSeverity: HIGH
baseScore: 7.1
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.2
version: 3.1

Trust: 1.0

ZDI: CVE-2025-52521
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-25-585 // NVD: CVE-2025-52521 // NVD: CVE-2025-52521

PROBLEMTYPE DATA

problemtype:CWE-64

Trust: 1.0

sources: NVD: CVE-2025-52521

PATCH

title:Trend Micro has issued an update to correct this vulnerability.url:https://helpcenter.trendmicro.com/en-us/article/tmka-18876

Trust: 0.7

sources: ZDI: ZDI-25-585

EXTERNAL IDS

db:NVDid:CVE-2025-52521

Trust: 1.7

db:ZDIid:ZDI-25-585

Trust: 1.7

db:ZDI_CANid:ZDI-CAN-26887

Trust: 0.7

sources: ZDI: ZDI-25-585 // NVD: CVE-2025-52521

REFERENCES

url:https://helpcenter.trendmicro.com/en-us/article/tmka-18876

Trust: 1.7

url:https://www.zerodayinitiative.com/advisories/zdi-25-585/

Trust: 1.0

sources: ZDI: ZDI-25-585 // NVD: CVE-2025-52521

CREDITS

Simon Zuckerbraun of Trend Zero Day Initiative

Trust: 0.7

sources: ZDI: ZDI-25-585

SOURCES

db:ZDIid:ZDI-25-585
db:NVDid:CVE-2025-52521

LAST UPDATE DATE

2025-08-27T22:57:30.085000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-25-585date:2025-07-08T00:00:00
db:NVDid:CVE-2025-52521date:2025-08-26T17:53:17.243

SOURCES RELEASE DATE

db:ZDIid:ZDI-25-585date:2025-07-08T00:00:00
db:NVDid:CVE-2025-52521date:2025-07-10T19:15:25.720