CVE-2025-45095: n/a
Lavasoft Web Companion (also known as Ad-Aware WebCompanion) versions 8.9.0.1091 through 12.1.3.1037 installs the DCIService.exe service with an unquoted service path vulnerability. An attacker with write access to the file system could potentially execute arbitrary code with elevated privileges by placing a malicious executable in the unquoted path.
AI Analysis
Technical Summary
CVE-2025-45095 identifies a security vulnerability in Lavasoft Web Companion (also known as Ad-Aware WebCompanion) versions 8.9.0.1091 through 12.1.3.1037. The issue is an unquoted service path vulnerability affecting the DCIService.exe Windows service. In Windows, if a service path contains spaces and is not enclosed in quotes, the operating system may interpret the path incorrectly, allowing an attacker to place a malicious executable in a higher-level directory in the path. When the service starts, Windows may execute the attacker's malicious executable instead of the legitimate service binary. This vulnerability requires the attacker to have write access to the file system locations in the service path, which could be achieved through local access or by exploiting other vulnerabilities that grant file system write permissions. Successful exploitation results in arbitrary code execution with SYSTEM-level privileges, effectively allowing privilege escalation. No CVSS score has been assigned yet, and no known exploits have been reported in the wild as of the publication date. The vulnerability is significant because it leverages a common misconfiguration in Windows services that can be exploited to gain elevated privileges. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for interim mitigations. The vulnerability affects multiple versions of Lavasoft Web Companion, a product used for adware and malware protection, which is deployed on many endpoints worldwide.
Potential Impact
For European organizations, this vulnerability poses a serious risk of privilege escalation and arbitrary code execution on affected endpoints. If exploited, attackers could gain SYSTEM-level access, allowing them to disable security controls, install persistent malware, or move laterally within the network. This could lead to data breaches, disruption of business operations, and compromise of sensitive information. Organizations with endpoints running affected versions of Lavasoft Web Companion are particularly vulnerable if endpoint security policies allow users or processes to write to service directories. The impact is heightened in sectors with critical infrastructure or sensitive data, such as finance, healthcare, and government. Although exploitation requires local file system write access, attackers could leverage other vulnerabilities or social engineering to gain this foothold. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers often develop exploits rapidly after disclosure. The vulnerability could also be used as part of a multi-stage attack chain, increasing its strategic value to threat actors targeting European entities.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first identify all endpoints running affected versions of Lavasoft Web Companion. Immediate steps include restricting write permissions on directories involved in the service path to prevent unauthorized file placement. Administrators should manually inspect the service path for DCIService.exe and ensure it is properly quoted to prevent misinterpretation by Windows. If possible, update or patch the software once a vendor fix is released. Until a patch is available, consider disabling the vulnerable service if it is not critical to operations or replacing the software with alternative security solutions. Employ endpoint protection solutions that monitor for unauthorized service modifications and suspicious executable placements. Regularly audit local user permissions to minimize the risk of unauthorized file system access. Additionally, educate users about the risks of downloading and executing untrusted files that could facilitate local access. Implement application whitelisting to prevent execution of unauthorized binaries in service directories. Finally, maintain robust incident detection capabilities to quickly identify any attempts to exploit this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-45095: n/a
Description
Lavasoft Web Companion (also known as Ad-Aware WebCompanion) versions 8.9.0.1091 through 12.1.3.1037 installs the DCIService.exe service with an unquoted service path vulnerability. An attacker with write access to the file system could potentially execute arbitrary code with elevated privileges by placing a malicious executable in the unquoted path.
AI-Powered Analysis
Technical Analysis
CVE-2025-45095 identifies a security vulnerability in Lavasoft Web Companion (also known as Ad-Aware WebCompanion) versions 8.9.0.1091 through 12.1.3.1037. The issue is an unquoted service path vulnerability affecting the DCIService.exe Windows service. In Windows, if a service path contains spaces and is not enclosed in quotes, the operating system may interpret the path incorrectly, allowing an attacker to place a malicious executable in a higher-level directory in the path. When the service starts, Windows may execute the attacker's malicious executable instead of the legitimate service binary. This vulnerability requires the attacker to have write access to the file system locations in the service path, which could be achieved through local access or by exploiting other vulnerabilities that grant file system write permissions. Successful exploitation results in arbitrary code execution with SYSTEM-level privileges, effectively allowing privilege escalation. No CVSS score has been assigned yet, and no known exploits have been reported in the wild as of the publication date. The vulnerability is significant because it leverages a common misconfiguration in Windows services that can be exploited to gain elevated privileges. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for interim mitigations. The vulnerability affects multiple versions of Lavasoft Web Companion, a product used for adware and malware protection, which is deployed on many endpoints worldwide.
Potential Impact
For European organizations, this vulnerability poses a serious risk of privilege escalation and arbitrary code execution on affected endpoints. If exploited, attackers could gain SYSTEM-level access, allowing them to disable security controls, install persistent malware, or move laterally within the network. This could lead to data breaches, disruption of business operations, and compromise of sensitive information. Organizations with endpoints running affected versions of Lavasoft Web Companion are particularly vulnerable if endpoint security policies allow users or processes to write to service directories. The impact is heightened in sectors with critical infrastructure or sensitive data, such as finance, healthcare, and government. Although exploitation requires local file system write access, attackers could leverage other vulnerabilities or social engineering to gain this foothold. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers often develop exploits rapidly after disclosure. The vulnerability could also be used as part of a multi-stage attack chain, increasing its strategic value to threat actors targeting European entities.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first identify all endpoints running affected versions of Lavasoft Web Companion. Immediate steps include restricting write permissions on directories involved in the service path to prevent unauthorized file placement. Administrators should manually inspect the service path for DCIService.exe and ensure it is properly quoted to prevent misinterpretation by Windows. If possible, update or patch the software once a vendor fix is released. Until a patch is available, consider disabling the vulnerable service if it is not critical to operations or replacing the software with alternative security solutions. Employ endpoint protection solutions that monitor for unauthorized service modifications and suspicious executable placements. Regularly audit local user permissions to minimize the risk of unauthorized file system access. Additionally, educate users about the risks of downloading and executing untrusted files that could facilitate local access. Implement application whitelisting to prevent execution of unauthorized binaries in service directories. Finally, maintain robust incident detection capabilities to quickly identify any attempts to exploit this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68e7c8edba0e608b4f9e1e8e
Added to database: 10/9/2025, 2:38:37 PM
Last enriched: 10/9/2025, 2:53:09 PM
Last updated: 10/9/2025, 5:04:48 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-60304: n/a
UnknownCVE-2025-60266: n/a
UnknownCVE-2025-60010: CWE-262 Not Using Password Aging in Juniper Networks Junos OS
MediumCVE-2025-60009: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Juniper Networks Junos Space
MediumCVE-2025-60006: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Juniper Networks Junos OS Evolved
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.