CVE-2025-21173: CWE-379: Creation of Temporary File in Directory with Insecure Permissions in Microsoft .NET 8.0
.NET Elevation of Privilege Vulnerability
AI Analysis
Technical Summary
CVE-2025-21173 is a high-severity elevation of privilege vulnerability identified in Microsoft .NET 8.0, specifically version 8.0.0. The vulnerability is classified under CWE-379, which involves the creation of temporary files in directories with insecure permissions. This security flaw allows an attacker with limited privileges (low-level privileges) to exploit the way .NET 8.0 handles temporary file creation. Because the temporary files are created in directories where permissions are not properly restricted, an attacker can potentially manipulate these files or replace them with malicious content. This can lead to elevation of privilege, enabling the attacker to execute code or perform actions with higher privileges than originally granted. The CVSS 3.1 base score of 7.3 reflects a high severity level, with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L). User interaction is required (UI:R), and the scope remains unchanged (S:U). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning the vulnerability can lead to significant compromise of system security. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that organizations should prioritize monitoring and mitigation efforts. The vulnerability was published on January 14, 2025, and has been enriched by CISA, emphasizing its importance in the cybersecurity community. The core technical issue is the insecure permissions on directories used for temporary file creation, which is a common vector for privilege escalation attacks when exploited by malicious local users or malware.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for enterprises and public sector entities that rely on .NET 8.0 for critical applications and services. Exploitation could allow attackers to escalate privileges from a low-level user account to higher privileged accounts, potentially leading to unauthorized access to sensitive data, disruption of services, or deployment of persistent malware. This is particularly concerning for industries with strict data protection requirements such as finance, healthcare, and government, where confidentiality and integrity of data are paramount. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments where insider threats or compromised user accounts exist. Additionally, the high impact on availability could lead to denial-of-service conditions affecting business continuity. Given the widespread adoption of Microsoft technologies across Europe, the vulnerability could affect a broad range of organizations, increasing the attack surface for threat actors targeting European infrastructure.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately audit and restrict permissions on directories used for temporary file creation by .NET applications, ensuring that only authorized users have write access. 2) Implement strict application whitelisting and endpoint protection to detect and prevent unauthorized file manipulations in temporary directories. 3) Enforce the principle of least privilege for all user accounts, minimizing the number of users with local access rights that could exploit this vulnerability. 4) Monitor system logs and file system changes for unusual activity related to temporary files, leveraging advanced threat detection tools. 5) Prepare for rapid deployment of patches once Microsoft releases an official fix, including testing in controlled environments to avoid operational disruptions. 6) Educate users about the risks of social engineering and the importance of cautious interaction with prompts that could trigger exploitation. 7) Consider isolating critical .NET applications in sandboxed or containerized environments to limit the impact of potential privilege escalation. These measures go beyond generic advice by focusing on permission hygiene, proactive monitoring, and user awareness tailored to the specific nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Ireland
CVE-2025-21173: CWE-379: Creation of Temporary File in Directory with Insecure Permissions in Microsoft .NET 8.0
Description
.NET Elevation of Privilege Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2025-21173 is a high-severity elevation of privilege vulnerability identified in Microsoft .NET 8.0, specifically version 8.0.0. The vulnerability is classified under CWE-379, which involves the creation of temporary files in directories with insecure permissions. This security flaw allows an attacker with limited privileges (low-level privileges) to exploit the way .NET 8.0 handles temporary file creation. Because the temporary files are created in directories where permissions are not properly restricted, an attacker can potentially manipulate these files or replace them with malicious content. This can lead to elevation of privilege, enabling the attacker to execute code or perform actions with higher privileges than originally granted. The CVSS 3.1 base score of 7.3 reflects a high severity level, with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L). User interaction is required (UI:R), and the scope remains unchanged (S:U). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning the vulnerability can lead to significant compromise of system security. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that organizations should prioritize monitoring and mitigation efforts. The vulnerability was published on January 14, 2025, and has been enriched by CISA, emphasizing its importance in the cybersecurity community. The core technical issue is the insecure permissions on directories used for temporary file creation, which is a common vector for privilege escalation attacks when exploited by malicious local users or malware.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for enterprises and public sector entities that rely on .NET 8.0 for critical applications and services. Exploitation could allow attackers to escalate privileges from a low-level user account to higher privileged accounts, potentially leading to unauthorized access to sensitive data, disruption of services, or deployment of persistent malware. This is particularly concerning for industries with strict data protection requirements such as finance, healthcare, and government, where confidentiality and integrity of data are paramount. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments where insider threats or compromised user accounts exist. Additionally, the high impact on availability could lead to denial-of-service conditions affecting business continuity. Given the widespread adoption of Microsoft technologies across Europe, the vulnerability could affect a broad range of organizations, increasing the attack surface for threat actors targeting European infrastructure.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately audit and restrict permissions on directories used for temporary file creation by .NET applications, ensuring that only authorized users have write access. 2) Implement strict application whitelisting and endpoint protection to detect and prevent unauthorized file manipulations in temporary directories. 3) Enforce the principle of least privilege for all user accounts, minimizing the number of users with local access rights that could exploit this vulnerability. 4) Monitor system logs and file system changes for unusual activity related to temporary files, leveraging advanced threat detection tools. 5) Prepare for rapid deployment of patches once Microsoft releases an official fix, including testing in controlled environments to avoid operational disruptions. 6) Educate users about the risks of social engineering and the importance of cautious interaction with prompts that could trigger exploitation. 7) Consider isolating critical .NET applications in sandboxed or containerized environments to limit the impact of potential privilege escalation. These measures go beyond generic advice by focusing on permission hygiene, proactive monitoring, and user awareness tailored to the specific nature of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-12-05T21:43:30.760Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981cc4522896dcbda74b
Added to database: 5/21/2025, 9:08:44 AM
Last enriched: 7/5/2025, 6:43:15 PM
Last updated: 8/14/2025, 6:09:36 AM
Views: 12
Related Threats
CVE-2025-8978: Insufficient Verification of Data Authenticity in D-Link DIR-619L
HighCVE-2025-8946: SQL Injection in projectworlds Online Notes Sharing Platform
MediumCVE-2025-51965: n/a
UnknownCVE-2025-8976: Cross Site Scripting in givanz Vvveb
MediumCVE-2025-8980: Insufficient Verification of Data Authenticity in Tenda G1
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.