Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57625: n/a

0
High
VulnerabilityCVE-2025-57625cvecve-2025-57625
Published: Tue Sep 16 2025 (09/16/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CYRISMA Sensor before 444 for Windows has an Insecure Folder and File Permissions vulnerability. A low-privileged user can abuse these issues to escalate privileges and execute arbitrary code in the context of NT AUTHORITY\SYSTEM by replacing DataSpotliteAgent.exe or any other binaries called by the Cyrisma_Agent service when it starts

AI-Powered Analysis

AILast updated: 09/24/2025, 01:10:32 UTC

Technical Analysis

CVE-2025-57625 is a high-severity vulnerability affecting CYRISMA Sensor versions prior to 444 on Windows platforms. The core issue stems from insecure folder and file permissions that allow a low-privileged user to escalate their privileges to SYSTEM level. Specifically, the vulnerability arises because critical binaries such as DataSpotliteAgent.exe, or other executables invoked by the Cyrisma_Agent service during startup, reside in locations with improperly set permissions. This misconfiguration enables an attacker with limited access to replace or modify these binaries. Upon service startup, the maliciously replaced executable runs with NT AUTHORITY\SYSTEM privileges, granting the attacker full control over the affected system. The vulnerability is categorized under CWE-276 (Incorrect Default Permissions), highlighting the root cause as improper permission settings. The CVSS v3.1 base score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with an attack vector that is network accessible, requires low privileges, and no user interaction. Although no known exploits are currently reported in the wild, the ease of exploitation and potential for full system compromise make this a critical concern for organizations using CYRISMA Sensor on Windows.

Potential Impact

For European organizations, the impact of CVE-2025-57625 could be severe. CYRISMA Sensor is typically deployed in enterprise environments for endpoint detection and response, meaning it often runs with elevated privileges and monitors critical systems. Exploitation of this vulnerability would allow attackers to gain SYSTEM-level access, enabling them to execute arbitrary code, move laterally within networks, exfiltrate sensitive data, or disrupt operations. This could lead to breaches of personal data protected under GDPR, resulting in regulatory fines and reputational damage. Additionally, critical infrastructure sectors such as finance, healthcare, and manufacturing that rely on CYRISMA Sensor for security monitoring could face operational disruptions or targeted attacks. The vulnerability's network attack vector and lack of required user interaction increase the risk of automated or remote exploitation, potentially affecting large numbers of systems rapidly.

Mitigation Recommendations

To mitigate CVE-2025-57625, organizations should immediately audit and correct the permissions on folders and files associated with CYRISMA Sensor, especially those containing DataSpotliteAgent.exe and other binaries executed by the Cyrisma_Agent service. Permissions should be restricted to trusted system accounts only, removing write access from low-privileged users. If a patch or updated version (444 or later) is available, organizations must prioritize deploying it to remediate the underlying permission issues. In the absence of a patch, implementing application whitelisting and monitoring for unauthorized changes to the relevant executables can help detect exploitation attempts. Additionally, employing endpoint detection rules to alert on unexpected service restarts or binary modifications related to Cyrisma_Agent can provide early warning. Network segmentation and limiting access to systems running CYRISMA Sensor can reduce the attack surface. Finally, conducting regular privilege audits and enforcing the principle of least privilege across endpoints will minimize the risk posed by similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c9a92f69caf095b57bf38e

Added to database: 9/16/2025, 6:15:11 PM

Last enriched: 9/24/2025, 1:10:32 AM

Last updated: 10/31/2025, 6:48:38 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats