CVE-2025-57625: n/a
CYRISMA Sensor before 444 for Windows has an Insecure Folder and File Permissions vulnerability. A low-privileged user can abuse these issues to escalate privileges and execute arbitrary code in the context of NT AUTHORITY\SYSTEM by replacing DataSpotliteAgent.exe or any other binaries called by the Cyrisma_Agent service when it starts
AI Analysis
Technical Summary
CVE-2025-57625 is a high-severity vulnerability affecting CYRISMA Sensor versions prior to 444 on Windows platforms. The core issue stems from insecure folder and file permissions that allow a low-privileged user to escalate their privileges to SYSTEM level. Specifically, the vulnerability arises because critical binaries such as DataSpotliteAgent.exe, or other executables invoked by the Cyrisma_Agent service during startup, reside in locations with improperly set permissions. This misconfiguration enables an attacker with limited access to replace or modify these binaries. Upon service startup, the maliciously replaced executable runs with NT AUTHORITY\SYSTEM privileges, granting the attacker full control over the affected system. The vulnerability is categorized under CWE-276 (Incorrect Default Permissions), highlighting the root cause as improper permission settings. The CVSS v3.1 base score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with an attack vector that is network accessible, requires low privileges, and no user interaction. Although no known exploits are currently reported in the wild, the ease of exploitation and potential for full system compromise make this a critical concern for organizations using CYRISMA Sensor on Windows.
Potential Impact
For European organizations, the impact of CVE-2025-57625 could be severe. CYRISMA Sensor is typically deployed in enterprise environments for endpoint detection and response, meaning it often runs with elevated privileges and monitors critical systems. Exploitation of this vulnerability would allow attackers to gain SYSTEM-level access, enabling them to execute arbitrary code, move laterally within networks, exfiltrate sensitive data, or disrupt operations. This could lead to breaches of personal data protected under GDPR, resulting in regulatory fines and reputational damage. Additionally, critical infrastructure sectors such as finance, healthcare, and manufacturing that rely on CYRISMA Sensor for security monitoring could face operational disruptions or targeted attacks. The vulnerability's network attack vector and lack of required user interaction increase the risk of automated or remote exploitation, potentially affecting large numbers of systems rapidly.
Mitigation Recommendations
To mitigate CVE-2025-57625, organizations should immediately audit and correct the permissions on folders and files associated with CYRISMA Sensor, especially those containing DataSpotliteAgent.exe and other binaries executed by the Cyrisma_Agent service. Permissions should be restricted to trusted system accounts only, removing write access from low-privileged users. If a patch or updated version (444 or later) is available, organizations must prioritize deploying it to remediate the underlying permission issues. In the absence of a patch, implementing application whitelisting and monitoring for unauthorized changes to the relevant executables can help detect exploitation attempts. Additionally, employing endpoint detection rules to alert on unexpected service restarts or binary modifications related to Cyrisma_Agent can provide early warning. Network segmentation and limiting access to systems running CYRISMA Sensor can reduce the attack surface. Finally, conducting regular privilege audits and enforcing the principle of least privilege across endpoints will minimize the risk posed by similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-57625: n/a
Description
CYRISMA Sensor before 444 for Windows has an Insecure Folder and File Permissions vulnerability. A low-privileged user can abuse these issues to escalate privileges and execute arbitrary code in the context of NT AUTHORITY\SYSTEM by replacing DataSpotliteAgent.exe or any other binaries called by the Cyrisma_Agent service when it starts
AI-Powered Analysis
Technical Analysis
CVE-2025-57625 is a high-severity vulnerability affecting CYRISMA Sensor versions prior to 444 on Windows platforms. The core issue stems from insecure folder and file permissions that allow a low-privileged user to escalate their privileges to SYSTEM level. Specifically, the vulnerability arises because critical binaries such as DataSpotliteAgent.exe, or other executables invoked by the Cyrisma_Agent service during startup, reside in locations with improperly set permissions. This misconfiguration enables an attacker with limited access to replace or modify these binaries. Upon service startup, the maliciously replaced executable runs with NT AUTHORITY\SYSTEM privileges, granting the attacker full control over the affected system. The vulnerability is categorized under CWE-276 (Incorrect Default Permissions), highlighting the root cause as improper permission settings. The CVSS v3.1 base score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with an attack vector that is network accessible, requires low privileges, and no user interaction. Although no known exploits are currently reported in the wild, the ease of exploitation and potential for full system compromise make this a critical concern for organizations using CYRISMA Sensor on Windows.
Potential Impact
For European organizations, the impact of CVE-2025-57625 could be severe. CYRISMA Sensor is typically deployed in enterprise environments for endpoint detection and response, meaning it often runs with elevated privileges and monitors critical systems. Exploitation of this vulnerability would allow attackers to gain SYSTEM-level access, enabling them to execute arbitrary code, move laterally within networks, exfiltrate sensitive data, or disrupt operations. This could lead to breaches of personal data protected under GDPR, resulting in regulatory fines and reputational damage. Additionally, critical infrastructure sectors such as finance, healthcare, and manufacturing that rely on CYRISMA Sensor for security monitoring could face operational disruptions or targeted attacks. The vulnerability's network attack vector and lack of required user interaction increase the risk of automated or remote exploitation, potentially affecting large numbers of systems rapidly.
Mitigation Recommendations
To mitigate CVE-2025-57625, organizations should immediately audit and correct the permissions on folders and files associated with CYRISMA Sensor, especially those containing DataSpotliteAgent.exe and other binaries executed by the Cyrisma_Agent service. Permissions should be restricted to trusted system accounts only, removing write access from low-privileged users. If a patch or updated version (444 or later) is available, organizations must prioritize deploying it to remediate the underlying permission issues. In the absence of a patch, implementing application whitelisting and monitoring for unauthorized changes to the relevant executables can help detect exploitation attempts. Additionally, employing endpoint detection rules to alert on unexpected service restarts or binary modifications related to Cyrisma_Agent can provide early warning. Network segmentation and limiting access to systems running CYRISMA Sensor can reduce the attack surface. Finally, conducting regular privilege audits and enforcing the principle of least privilege across endpoints will minimize the risk posed by similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-17T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68c9a92f69caf095b57bf38e
Added to database: 9/16/2025, 6:15:11 PM
Last enriched: 9/24/2025, 1:10:32 AM
Last updated: 10/31/2025, 6:48:38 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-58152: Files or directories accessible to external parties in Century Systems Co., Ltd. FutureNet MA-X series
MediumCVE-2025-54763: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Century Systems Co., Ltd. FutureNet MA-X series
HighCVE-2025-50739: n/a
UnknownCVE-2025-50736: n/a
UnknownCVE-2025-11975: CWE-862 Missing Authorization in fusewp FuseWP – WordPress User Sync to Email List & Marketing Automation (Mailchimp, Constant Contact, ActiveCampaign etc.)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.