Skip to main content

CVE-2025-21173: CWE-379: Creation of Temporary File in Directory with Insecure Permissions in Microsoft .NET 8.0

High
VulnerabilityCVE-2025-21173cvecve-2025-21173cwe-379
Published: Tue Jan 14 2025 (01/14/2025, 18:04:02 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: .NET 8.0

Description

.NET Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 07/05/2025, 18:43:15 UTC

Technical Analysis

CVE-2025-21173 is a high-severity elevation of privilege vulnerability identified in Microsoft .NET 8.0, specifically version 8.0.0. The vulnerability is classified under CWE-379, which involves the creation of temporary files in directories with insecure permissions. This security flaw allows an attacker with limited privileges (low-level privileges) to exploit the way .NET 8.0 handles temporary file creation. Because the temporary files are created in directories where permissions are not properly restricted, an attacker can potentially manipulate these files or replace them with malicious content. This can lead to elevation of privilege, enabling the attacker to execute code or perform actions with higher privileges than originally granted. The CVSS 3.1 base score of 7.3 reflects a high severity level, with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L). User interaction is required (UI:R), and the scope remains unchanged (S:U). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning the vulnerability can lead to significant compromise of system security. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that organizations should prioritize monitoring and mitigation efforts. The vulnerability was published on January 14, 2025, and has been enriched by CISA, emphasizing its importance in the cybersecurity community. The core technical issue is the insecure permissions on directories used for temporary file creation, which is a common vector for privilege escalation attacks when exploited by malicious local users or malware.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises and public sector entities that rely on .NET 8.0 for critical applications and services. Exploitation could allow attackers to escalate privileges from a low-level user account to higher privileged accounts, potentially leading to unauthorized access to sensitive data, disruption of services, or deployment of persistent malware. This is particularly concerning for industries with strict data protection requirements such as finance, healthcare, and government, where confidentiality and integrity of data are paramount. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments where insider threats or compromised user accounts exist. Additionally, the high impact on availability could lead to denial-of-service conditions affecting business continuity. Given the widespread adoption of Microsoft technologies across Europe, the vulnerability could affect a broad range of organizations, increasing the attack surface for threat actors targeting European infrastructure.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately audit and restrict permissions on directories used for temporary file creation by .NET applications, ensuring that only authorized users have write access. 2) Implement strict application whitelisting and endpoint protection to detect and prevent unauthorized file manipulations in temporary directories. 3) Enforce the principle of least privilege for all user accounts, minimizing the number of users with local access rights that could exploit this vulnerability. 4) Monitor system logs and file system changes for unusual activity related to temporary files, leveraging advanced threat detection tools. 5) Prepare for rapid deployment of patches once Microsoft releases an official fix, including testing in controlled environments to avoid operational disruptions. 6) Educate users about the risks of social engineering and the importance of cautious interaction with prompts that could trigger exploitation. 7) Consider isolating critical .NET applications in sandboxed or containerized environments to limit the impact of potential privilege escalation. These measures go beyond generic advice by focusing on permission hygiene, proactive monitoring, and user awareness tailored to the specific nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-05T21:43:30.760Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbda74b

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/5/2025, 6:43:15 PM

Last updated: 8/14/2025, 6:09:36 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats