{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T22:42:01.699","vulnerabilities":[{"cve":{"id":"CVE-2025-31285","sourceIdentifier":"security@trendmicro.com","published":"2025-04-02T17:15:48.943","lastModified":"2025-09-02T18:33:05.810","vulnStatus":"Analyzed","cveTags":[{"sourceIdentifier":"security@trendmicro.com","tags":["exclusively-hosted-service"]}],"descriptions":[{"lang":"en","value":"A broken access control vulnerability previously discovered in the Trend Vision One Role Name component could have allowed an administrator to create users who could then change the role of the account and ultimately escalate privileges. \r\n\r\nPlease note: ths issue has already been addressed on the backend service and is no longer considered an active vulnerability."},{"lang":"es","value":"Una vulnerabilidad de control de acceso fallida, descubierta previamente en el componente Trend Vision One Role Name, podría haber permitido a un administrador crear usuarios que posteriormente podrían cambiar el rol de la cuenta y, en última instancia, escalar privilegios. Nota: Este problema ya se ha solucionado en el servicio backend y ya no se considera una vulnerabilidad activa."}],"metrics":{"cvssMetricV31":[{"source":"security@trendmicro.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:L\/I:L\/A:N","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:H\/UI:N\/S:U\/C:H\/I:H\/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"security@trendmicro.com","type":"Secondary","description":[{"lang":"en","value":"CWE-269"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trendmicro:trend_vision_one:-:*:*:*:*:*:*:*","matchCriteriaId":"761D8AA4-4FAC-4797-84B3-20DA7F69DF8E"}]}]}],"references":[{"url":"https:\/\/success.trendmicro.com\/en-US\/solution\/KA-0019386","source":"security@trendmicro.com","tags":["Vendor Advisory"]}]}}]}