Skip to main content

CVE-2025-3025: CWE-552 Files or Directories Accessible to External Parties in Gen Digital CCleaner

High
VulnerabilityCVE-2025-3025cvecve-2025-3025cwe-552
Published: Mon Sep 15 2025 (09/15/2025, 12:20:21 UTC)
Source: CVE Database V5
Vendor/Project: Gen Digital
Product: CCleaner

Description

Elevation of Privileges in the cleaning feature of Gen Digital CCleaner version 6.33.11465 on Windows allows a local user to gain SYSTEM privileges via exploiting insecure file delete operations. Reported in CCleaner v. 6.33.11465. This issue affects CCleaner: before < 6.36.11508.

AI-Powered Analysis

AILast updated: 09/15/2025, 12:39:32 UTC

Technical Analysis

CVE-2025-3025 is a high-severity elevation of privilege vulnerability affecting Gen Digital's CCleaner software, specifically versions prior to 6.36.11508, including version 6.33.11465 on Windows platforms. The vulnerability arises from insecure file deletion operations within the cleaning feature of the application. A local user with limited privileges can exploit this flaw to gain SYSTEM-level privileges, the highest level of access on a Windows system. The root cause is classified under CWE-552, which involves files or directories being accessible to external parties, indicating improper access control on sensitive files or directories used during the cleaning process. Exploitation requires local access and some user interaction, but the attack complexity is low, making it feasible for an attacker with local access to escalate privileges significantly. The vulnerability impacts confidentiality, integrity, and availability, as SYSTEM privileges allow an attacker to fully control the affected system, potentially leading to data theft, system manipulation, or denial of service. No known public exploits are reported yet, but the vulnerability's nature and CVSS score of 7.3 highlight a serious risk that should be addressed promptly. The vulnerability was publicly disclosed on September 15, 2025, and affects Windows installations of CCleaner, a widely used system optimization and cleaning tool.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in environments where CCleaner is deployed on Windows endpoints. The ability for a local user to escalate privileges to SYSTEM level can lead to full system compromise, enabling attackers to bypass security controls, access sensitive data, install persistent malware, or disrupt operations. Organizations with shared workstations, insufficient endpoint access controls, or those that allow users to install or run CCleaner without strict oversight are particularly vulnerable. The impact is heightened in sectors with stringent data protection requirements such as finance, healthcare, and government, where unauthorized access to sensitive information could lead to regulatory penalties under GDPR and damage to reputation. Additionally, the vulnerability could be leveraged in multi-stage attacks where initial access is limited, but privilege escalation is required to move laterally or escalate impact. Given CCleaner's popularity in Europe, the risk of exploitation could affect a broad range of organizations if patches are not applied swiftly.

Mitigation Recommendations

European organizations should immediately verify the presence of CCleaner versions prior to 6.36.11508 on all Windows endpoints and prioritize upgrading to the patched version once available. Until patches are deployed, restrict local user permissions to prevent unauthorized execution of CCleaner or limit its use to trusted administrators only. Implement application whitelisting to control which software can run on endpoints, reducing the risk of exploitation. Conduct thorough endpoint audits to identify and remove unauthorized or outdated software versions. Enhance monitoring for unusual privilege escalation attempts and suspicious file operations related to CCleaner processes. Employ endpoint detection and response (EDR) solutions capable of detecting exploitation attempts targeting local privilege escalation vulnerabilities. Additionally, educate users about the risks of running system utilities without proper authorization and enforce least privilege principles to minimize the number of users with local access rights that could exploit this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
NLOK
Date Reserved
2025-03-31T09:08:13.800Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c808eec396be2414c8bd3c

Added to database: 9/15/2025, 12:39:10 PM

Last enriched: 9/15/2025, 12:39:32 PM

Last updated: 9/15/2025, 1:12:29 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats