CVE-2025-3771: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Trellix System Information Reporter
A path or symbolic link manipulation vulnerability in SIR 1.0.3 and prior versions allows an authenticated non-admin local user to overwrite system files with SIR backup files, which can potentially cause a system crash. This was achieved by adding a malicious entry to the registry under the Trellix SIR registry folder or via policy or with a junction symbolic link to files that the user would not normally have permission to acces
AI Analysis
Technical Summary
CVE-2025-3771 is a high-severity vulnerability identified in Trellix System Information Reporter version 1.0.3. It is categorized under CWE-59, which pertains to improper link resolution before file access, commonly known as 'link following'. The vulnerability allows a local user with limited privileges to exploit the way the System Information Reporter handles registry backup files. Specifically, the application fails to properly validate or restrict the resolution of junction symbolic links when writing registry backup files. An attacker can create a junction symlink pointing to an arbitrary location on the filesystem. When the System Information Reporter writes its registry backup, it follows this symlink and writes the backup file to the attacker-controlled location. This can lead to unauthorized file write operations, potentially overwriting critical files or placing malicious files in sensitive locations. The CVSS 4.0 base score is 7.2, reflecting a high severity due to the combination of local attack vector, low attack complexity, partial privileges required, no user interaction, and significant impacts on confidentiality, integrity, and availability. Although exploitation requires local access and partial privileges, the vulnerability can be leveraged to escalate privileges or disrupt system operations by manipulating registry backup files. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is specific to version 1.0.3 of Trellix System Information Reporter, a tool used for system information collection and reporting, often deployed in enterprise environments for IT management and security auditing.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily in environments where Trellix System Information Reporter is deployed, especially in enterprises relying on this tool for system inventory and registry backup processes. The ability for a local user to write files arbitrarily can lead to privilege escalation, persistence mechanisms, or sabotage of system integrity. This could result in unauthorized access to sensitive configuration data, disruption of system monitoring, or interference with incident response activities. Given the critical role of registry backups in Windows system recovery and configuration, tampering with these files could cause system instability or complicate forensic investigations. Organizations in sectors with strict regulatory requirements for data integrity and system availability, such as finance, healthcare, and critical infrastructure, may face compliance risks and operational disruptions. The local nature of the attack vector means insider threats or compromised user accounts pose the greatest risk. However, in environments with shared workstations or insufficient endpoint security, the vulnerability could be exploited to move laterally or escalate privileges.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if Trellix System Information Reporter version 1.0.3 is in use within their environment. Until an official patch is released, organizations should restrict local user permissions to prevent untrusted users from creating junction symlinks or writing to directories used by the System Information Reporter. Implement strict access controls on directories where registry backups are stored to prevent unauthorized file creation or modification. Employ endpoint detection and response (EDR) solutions to monitor for suspicious symlink creation or unusual file write activities related to the System Information Reporter. Additionally, conduct regular audits of filesystem permissions and symlink usage to detect potential exploitation attempts. Organizations should also consider isolating or limiting the use of the affected tool on high-risk systems and educate users about the risks of local privilege escalation attacks. Once available, promptly apply vendor patches or updates addressing this vulnerability. Finally, incorporate this vulnerability into incident response plans to quickly identify and remediate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-3771: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Trellix System Information Reporter
Description
A path or symbolic link manipulation vulnerability in SIR 1.0.3 and prior versions allows an authenticated non-admin local user to overwrite system files with SIR backup files, which can potentially cause a system crash. This was achieved by adding a malicious entry to the registry under the Trellix SIR registry folder or via policy or with a junction symbolic link to files that the user would not normally have permission to acces
AI-Powered Analysis
Technical Analysis
CVE-2025-3771 is a high-severity vulnerability identified in Trellix System Information Reporter version 1.0.3. It is categorized under CWE-59, which pertains to improper link resolution before file access, commonly known as 'link following'. The vulnerability allows a local user with limited privileges to exploit the way the System Information Reporter handles registry backup files. Specifically, the application fails to properly validate or restrict the resolution of junction symbolic links when writing registry backup files. An attacker can create a junction symlink pointing to an arbitrary location on the filesystem. When the System Information Reporter writes its registry backup, it follows this symlink and writes the backup file to the attacker-controlled location. This can lead to unauthorized file write operations, potentially overwriting critical files or placing malicious files in sensitive locations. The CVSS 4.0 base score is 7.2, reflecting a high severity due to the combination of local attack vector, low attack complexity, partial privileges required, no user interaction, and significant impacts on confidentiality, integrity, and availability. Although exploitation requires local access and partial privileges, the vulnerability can be leveraged to escalate privileges or disrupt system operations by manipulating registry backup files. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is specific to version 1.0.3 of Trellix System Information Reporter, a tool used for system information collection and reporting, often deployed in enterprise environments for IT management and security auditing.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily in environments where Trellix System Information Reporter is deployed, especially in enterprises relying on this tool for system inventory and registry backup processes. The ability for a local user to write files arbitrarily can lead to privilege escalation, persistence mechanisms, or sabotage of system integrity. This could result in unauthorized access to sensitive configuration data, disruption of system monitoring, or interference with incident response activities. Given the critical role of registry backups in Windows system recovery and configuration, tampering with these files could cause system instability or complicate forensic investigations. Organizations in sectors with strict regulatory requirements for data integrity and system availability, such as finance, healthcare, and critical infrastructure, may face compliance risks and operational disruptions. The local nature of the attack vector means insider threats or compromised user accounts pose the greatest risk. However, in environments with shared workstations or insufficient endpoint security, the vulnerability could be exploited to move laterally or escalate privileges.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if Trellix System Information Reporter version 1.0.3 is in use within their environment. Until an official patch is released, organizations should restrict local user permissions to prevent untrusted users from creating junction symlinks or writing to directories used by the System Information Reporter. Implement strict access controls on directories where registry backups are stored to prevent unauthorized file creation or modification. Employ endpoint detection and response (EDR) solutions to monitor for suspicious symlink creation or unusual file write activities related to the System Information Reporter. Additionally, conduct regular audits of filesystem permissions and symlink usage to detect potential exploitation attempts. Organizations should also consider isolating or limiting the use of the affected tool on high-risk systems and educate users about the risks of local privilege escalation attacks. Once available, promptly apply vendor patches or updates addressing this vulnerability. Finally, incorporate this vulnerability into incident response plans to quickly identify and remediate exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- trellix
- Date Reserved
- 2025-04-17T16:11:46.344Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 685d2cdeca1063fb8741469d
Added to database: 6/26/2025, 11:19:58 AM
Last enriched: 6/26/2025, 11:35:08 AM
Last updated: 11/20/2025, 11:02:13 AM
Views: 113
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12414: CWE-290 Authentication Bypass by Spoofing in Google Cloud Looker
CriticalCVE-2025-62346: CWE-352 Cross-Site Request Forgery (CSRF) in HCL Software Glovius Cloud
MediumCVE-2025-11676: CWE-20 Improper Input Validation in TP-Link System Inc. TL-WR940N V6
HighCVE-2024-4438: Uncontrolled Resource Consumption
HighCVE-2024-4437: Uncontrolled Resource Consumption
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.