Skip to main content

CVE-2025-57846: Incorrect default permissions in Digital Arts Inc. i-フィルター 6.0

High
VulnerabilityCVE-2025-57846cvecve-2025-57846
Published: Wed Aug 27 2025 (08/27/2025, 05:28:42 UTC)
Source: CVE Database V5
Vendor/Project: Digital Arts Inc.
Product: i-フィルター 6.0

Description

Multiple i-フィルター products contain an issue with incorrect default permissions. If this vulnerability is exploited, a local authenticated attacker may replace a service executable on the system where the product is running, potentially allowing arbitrary code execution with SYSTEM privileges.

AI-Powered Analysis

AILast updated: 08/27/2025, 05:47:49 UTC

Technical Analysis

CVE-2025-57846 is a high-severity vulnerability affecting Digital Arts Inc.'s i-フィルター 6.0 product, specifically versions prior to 6.00.55. The vulnerability arises from incorrect default permissions set on certain components of the software. This misconfiguration allows a local attacker with authenticated access to the system to replace a service executable used by the product. By doing so, the attacker can execute arbitrary code with SYSTEM-level privileges, effectively gaining full control over the affected system. The vulnerability requires local access and low privileges (local authenticated user), but does not require user interaction beyond authentication. The CVSS v3.0 score of 7.8 reflects the high impact on confidentiality, integrity, and availability, given that SYSTEM-level code execution can lead to complete compromise of the host. The vulnerability does not appear to have known exploits in the wild as of the publication date, but the potential for privilege escalation and system takeover makes it a critical concern for organizations using this software. The issue is specifically tied to default permission settings, indicating a configuration or development oversight that allows unauthorized modification of critical service executables. Remediation involves updating to version 6.00.55 or later, where the permissions are corrected to prevent unauthorized replacement of executables.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those using Digital Arts Inc.'s i-フィルター 6.0 product. This product is typically used for content filtering and internet security, often deployed in educational institutions, enterprises, and government agencies. Exploitation could lead to full system compromise, data breaches, disruption of services, and potential lateral movement within networks. Given the SYSTEM-level privileges gained, attackers could disable security controls, exfiltrate sensitive data, or deploy ransomware. The local authentication requirement limits remote exploitation but insider threats or compromised user accounts could be leveraged to exploit this vulnerability. Organizations with strict regulatory requirements around data protection (e.g., GDPR) could face compliance issues and reputational damage if exploited. The absence of known exploits in the wild provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

1. Immediate upgrade to i-フィルター version 6.00.55 or later where the permission issue is resolved. 2. Conduct an audit of all systems running i-フィルター 6.0 to identify vulnerable versions. 3. Restrict local user accounts to the minimum necessary privileges to reduce the risk of exploitation by low-privilege users. 4. Implement strict access controls and monitoring on systems running the product to detect unauthorized file modifications, especially of service executables. 5. Employ application whitelisting to prevent unauthorized executable replacements. 6. Use endpoint detection and response (EDR) tools to monitor for suspicious activity indicative of privilege escalation or code execution. 7. Educate system administrators and users about the risks of local privilege escalation vulnerabilities and the importance of applying patches promptly. 8. Regularly review and harden default permissions on critical system files and services beyond just this product to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-08-21T04:04:10.182Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ae9881ad5a09ad005f55cb

Added to database: 8/27/2025, 5:32:49 AM

Last enriched: 8/27/2025, 5:47:49 AM

Last updated: 8/27/2025, 8:03:32 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats