Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13733: CWE-732 Incorrect Permission Assignment for Critical Resource in Dr.Buho BuhoNTFS

0
High
VulnerabilityCVE-2025-13733cvecve-2025-13733cwe-732
Published: Fri Dec 12 2025 (12/12/2025, 15:58:37 UTC)
Source: CVE Database V5
Vendor/Project: Dr.Buho
Product: BuhoNTFS

Description

CVE-2025-13733 is a high-severity local privilege escalation vulnerability in BuhoNTFS version 1. 3. 2 caused by incorrect permission assignment in an XPC service. It allows unprivileged local users to escalate privileges to root without user interaction or authentication. The vulnerability stems from insecure functions within the XPC service that expose critical resources with improper permissions. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to systems running the affected version. European organizations using BuhoNTFS 1. 3. 2, especially those in sectors with sensitive data or critical infrastructure, could face severe confidentiality, integrity, and availability impacts if exploited. Mitigation requires immediate patching once available, restricting local user access, and auditing permission settings on XPC services.

AI-Powered Analysis

AILast updated: 01/22/2026, 21:40:17 UTC

Technical Analysis

CVE-2025-13733 is a vulnerability identified in Dr.Buho's BuhoNTFS software version 1.3.2, involving CWE-732: Incorrect Permission Assignment for Critical Resource. The root cause is an insecure XPC (interprocess communication) service that exposes critical functions with improper permissions, allowing local, unprivileged users to escalate their privileges to root. The vulnerability does not require user interaction or prior authentication but does require local access to the system. The CVSS 4.0 score of 8.5 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation grants full system control. The insecure permission assignment means that critical resources intended to be protected are accessible by lower-privileged users, enabling them to execute privileged operations. While no public exploits are known yet, the vulnerability's nature makes it a prime target for attackers who have local access, such as through compromised accounts or insider threats. The lack of a patch at the time of publication increases the urgency for organizations to implement compensating controls. This vulnerability affects only version 1.3.2 of BuhoNTFS, a software product used for NTFS file system support, which may be deployed in environments requiring cross-platform file system compatibility.

Potential Impact

For European organizations, exploitation of CVE-2025-13733 could lead to complete system compromise on affected machines, resulting in unauthorized access to sensitive data, disruption of services, and potential lateral movement within networks. The ability to escalate privileges to root undermines all security controls on the host, threatening confidentiality, integrity, and availability. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly at risk due to the sensitivity of their data and the potential for operational disruption. The vulnerability could facilitate insider threats or attacks following initial local compromise, increasing the risk of data breaches or sabotage. Additionally, the lack of a patch at the time of disclosure means organizations must rely on mitigating controls, increasing operational complexity. The impact is magnified in environments where BuhoNTFS is used on critical servers or workstations, especially those exposed to multiple users or less controlled local access.

Mitigation Recommendations

1. Immediately restrict local user access to systems running BuhoNTFS 1.3.2 to trusted personnel only. 2. Monitor and audit local user activities and permission settings on XPC services to detect unauthorized access attempts. 3. Implement strict access control policies and use endpoint protection solutions to limit execution of unauthorized code. 4. Disable or restrict the vulnerable XPC service if possible until an official patch is released. 5. Employ application whitelisting to prevent exploitation of insecure functions within BuhoNTFS. 6. Prepare for rapid deployment of patches once available by maintaining an up-to-date asset inventory and patch management process. 7. Educate system administrators and users about the risks of local privilege escalation and the importance of minimizing local access. 8. Consider network segmentation to isolate systems running BuhoNTFS from less trusted network zones. 9. Use intrusion detection systems to identify suspicious local privilege escalation attempts. 10. Engage with Dr.Buho support channels to obtain updates or workarounds.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Fluid Attacks
Date Reserved
2025-11-26T01:00:32.238Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693c3cd3dc37602712b2e436

Added to database: 12/12/2025, 4:03:31 PM

Last enriched: 1/22/2026, 9:40:17 PM

Last updated: 2/6/2026, 3:28:51 PM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats