Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-37735: CWE-281 Improper Preservation of Permissions in Elastic Kibana

0
High
VulnerabilityCVE-2025-37735cvecve-2025-37735cwe-281
Published: Thu Nov 06 2025 (11/06/2025, 14:27:26 UTC)
Source: CVE Database V5
Vendor/Project: Elastic
Product: Kibana

Description

Improper preservation of permissions in Elastic Defend on Windows hosts can lead to arbitrary files on the system being deleted by the Defend service running as SYSTEM. In some cases, this could result in local privilege escalation.

AI-Powered Analysis

AILast updated: 11/06/2025, 14:49:27 UTC

Technical Analysis

CVE-2025-37735 is a vulnerability identified in Elastic Kibana versions 8.0.0 and 9.0.0, specifically affecting the Elastic Defend component on Windows hosts. The root cause is an improper preservation of permissions (classified under CWE-281), where the Defend service, which operates with SYSTEM-level privileges, does not correctly enforce file permission constraints. This flaw allows the service to delete arbitrary files on the host system. Since the Defend service runs with elevated privileges, an attacker with low-level local access can exploit this to delete critical system or application files, potentially leading to local privilege escalation. The vulnerability requires local access with low privileges and does not require user interaction, but the attack complexity is high due to the need to manipulate the Defend service's behavior. The impact spans confidentiality, integrity, and availability, as arbitrary file deletion can disrupt system operations, compromise data, or facilitate further privilege escalation. While no public exploits are currently known, the vulnerability's presence in widely used Elastic Kibana versions makes it a significant concern. The CVSS v3.1 score of 7.0 (AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) reflects a high-severity issue with local attack vector, high attack complexity, and significant impact on system security properties.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially those relying on Elastic Kibana for security monitoring, logging, and analytics on Windows environments. Exploitation could lead to unauthorized deletion of critical files, causing service disruptions, data loss, or enabling attackers to escalate privileges locally. This could undermine incident detection and response capabilities, impacting operational continuity and compliance with data protection regulations such as GDPR. Organizations in sectors with stringent security requirements—such as finance, healthcare, energy, and government—may face heightened risks. The potential for local privilege escalation also increases the threat landscape by enabling attackers to gain broader system control, potentially facilitating lateral movement or persistent access within networks. Given the widespread use of Elastic products in Europe, the vulnerability could affect a broad range of enterprises and public institutions.

Mitigation Recommendations

1. Monitor Elastic's official channels for patches addressing CVE-2025-37735 and apply updates promptly once available. 2. Restrict local access to Windows hosts running Elastic Defend to trusted personnel only, minimizing the risk of low-privilege users exploiting the vulnerability. 3. Implement strict file system permissions and auditing on hosts to detect unauthorized file deletions or modifications, focusing on directories used by Elastic Defend. 4. Employ application whitelisting and endpoint protection solutions to monitor and control the behavior of the Defend service and related processes. 5. Conduct regular security assessments and penetration tests simulating local privilege escalation attempts to validate the effectiveness of controls. 6. Isolate critical Elastic Kibana instances and Windows hosts in segmented network zones to limit potential lateral movement in case of exploitation. 7. Educate system administrators and security teams about this vulnerability to ensure rapid detection and response to suspicious activities related to file deletions by the Defend service.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
elastic
Date Reserved
2025-04-16T03:24:04.511Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690cb5652a1e959dda296a64

Added to database: 11/6/2025, 2:49:09 PM

Last enriched: 11/6/2025, 2:49:27 PM

Last updated: 11/6/2025, 3:51:32 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats