Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34352: CWE-378 Creation of Temporary File With Insecure Permissions in JumpCloud Inc. Remote Assist

0
High
VulnerabilityCVE-2025-34352cvecve-2025-34352cwe-378cwe-59
Published: Tue Dec 02 2025 (12/02/2025, 18:39:33 UTC)
Source: CVE Database V5
Vendor/Project: JumpCloud Inc.
Product: Remote Assist

Description

CVE-2025-34352 is a high-severity local privilege escalation vulnerability in JumpCloud Remote Assist for Windows versions prior to 0. 317. 0. It arises from insecure creation and manipulation of temporary files by the uninstaller running with SYSTEM privileges. A low-privileged local attacker can exploit this by creating a user-writable %TEMP% subdirectory with weak permissions and leveraging symbolic links or mount points to redirect file operations. This can lead to arbitrary file writes or deletions in protected system locations, potentially causing denial of service or escalation to SYSTEM privileges. No user interaction is required, but local access with low privileges is necessary. The vulnerability affects Windows systems with JumpCloud Remote Assist installed and managed via the JumpCloud Agent lifecycle. The issue is fixed in version 0. 317.

AI-Powered Analysis

AILast updated: 12/18/2025, 10:26:48 UTC

Technical Analysis

CVE-2025-34352 is a vulnerability classified under CWE-378 (Creation of Temporary File With Insecure Permissions) and CWE-59 (Link Following). It affects JumpCloud Remote Assist for Windows prior to version 0.317.0. The root cause is the insecure handling of temporary files by the uninstaller process, which runs with SYSTEM privileges. Specifically, the uninstaller creates and manipulates temporary files in the %TEMP% directory without properly securing permissions. An attacker with low local privileges can pre-create a subdirectory within %TEMP% that is writable by the user and use symbolic links or mount points to redirect file operations to arbitrary locations on the system. Because the uninstaller runs as SYSTEM, this redirection can lead to arbitrary file writes or deletions in protected system areas. The consequences include denial of service by corrupting critical files or local privilege escalation by overwriting system files or executables, effectively granting SYSTEM-level access. Exploitation does not require user interaction but does require local access with low privileges. The vulnerability is specific to Windows environments where JumpCloud Remote Assist is installed and managed through the JumpCloud Agent lifecycle. The vendor has addressed the issue in version 0.317.0. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects that the attack requires local access with low privileges, no user interaction, and results in high confidentiality, integrity, and availability impacts.

Potential Impact

For European organizations using JumpCloud Remote Assist on Windows systems, this vulnerability poses a significant risk. An attacker with low-level local access—such as a compromised user account or insider threat—can escalate privileges to SYSTEM, gaining full control over affected machines. This can lead to unauthorized access to sensitive data, disruption of critical services through denial of service, and potential lateral movement within the network. The ability to write or delete arbitrary files in protected system locations undermines system integrity and availability, potentially causing operational downtime. Given the high CVSS score and the SYSTEM-level impact, exploitation could severely affect confidentiality, integrity, and availability of IT assets. Organizations with remote support workflows relying on JumpCloud Remote Assist are particularly at risk, especially if endpoint security controls are insufficient to prevent local privilege escalation attempts. The lack of required user interaction facilitates stealthy exploitation once local access is obtained.

Mitigation Recommendations

European organizations should immediately verify the version of JumpCloud Remote Assist deployed on their Windows endpoints and upgrade to version 0.317.0 or later where the vulnerability is patched. In addition to patching, organizations should enforce strict permissions on the %TEMP% directory and its subdirectories to prevent unauthorized creation or modification of symbolic links or mount points by low-privileged users. Endpoint detection and response (EDR) solutions should be configured to monitor for suspicious file system activities involving symbolic links or unusual file operations within %TEMP%. Restricting local user permissions to prevent unnecessary write access to system directories and employing application whitelisting can reduce exploitation risk. Regular auditing of installed software and uninstaller behavior is recommended. Network segmentation and least privilege principles should be applied to limit the impact of any local compromise. Finally, user training to recognize and report suspicious local activities can aid early detection.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.589Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692f3503e0601f8fcd752d43

Added to database: 12/2/2025, 6:50:43 PM

Last enriched: 12/18/2025, 10:26:48 AM

Last updated: 1/16/2026, 5:22:53 PM

Views: 199

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats