Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58322: CWE-266 Incorrect Privilege Assignment in NAVER NAVER MYBOX Explorer

0
High
VulnerabilityCVE-2025-58322cvecve-2025-58322cwe-266
Published: Thu Aug 28 2025 (08/28/2025, 08:02:35 UTC)
Source: CVE Database V5
Vendor/Project: NAVER
Product: NAVER MYBOX Explorer

Description

NAVER MYBOX Explorer for Windows before 3.0.8.133 allows a local attacker to escalate privileges to NT AUTHORITY\SYSTEM by invoking arbitrary DLLs due to improper privilege checks.

AI-Powered Analysis

AILast updated: 09/04/2025, 18:32:33 UTC

Technical Analysis

CVE-2025-58322 is a high-severity local privilege escalation vulnerability found in NAVER MYBOX Explorer for Windows versions prior to 3.0.8.133. The vulnerability arises from improper privilege checks related to DLL loading, allowing a local attacker to escalate their privileges to NT AUTHORITY\SYSTEM by invoking arbitrary DLLs. This is classified under CWE-266, which concerns incorrect privilege assignment. The attacker must have local access with at least low privileges (PR:L) and no user interaction is required (UI:N). The vulnerability affects the confidentiality, integrity, and availability of the system, as the attacker can gain full system control. The CVSS v3.1 base score is 7.8, reflecting a high severity due to the combination of local attack vector, low complexity, required privileges, and the critical impact on system security. No known exploits are currently reported in the wild, and no patch links have been provided yet, indicating the vulnerability is newly disclosed or not yet fully addressed by the vendor. NAVER MYBOX Explorer is a Windows-based file management tool integrated with NAVER's cloud storage services, and this flaw allows malicious local users to bypass security restrictions by loading arbitrary DLLs with SYSTEM-level privileges, potentially leading to complete system compromise.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in environments where NAVER MYBOX Explorer is deployed, such as companies using NAVER's cloud storage solutions or related software. An attacker with local access—such as an insider threat, a compromised user account, or through social engineering to gain initial foothold—could exploit this flaw to gain SYSTEM-level privileges. This would allow them to bypass all security controls, access sensitive data, install persistent malware, or disrupt critical services. The impact is particularly severe in regulated industries (finance, healthcare, government) where data confidentiality and system integrity are paramount. Additionally, organizations with remote or hybrid workforces may face increased risk if endpoint security is weak, as attackers could leverage this vulnerability to escalate privileges on compromised devices. The lack of a patch and known exploits in the wild means organizations must proactively mitigate the risk to prevent potential exploitation once public exploits emerge.

Mitigation Recommendations

1. Immediate mitigation should include restricting local access to systems running vulnerable versions of NAVER MYBOX Explorer, limiting user privileges, and enforcing strict endpoint security policies. 2. Monitor and audit DLL loading behavior and privilege escalation attempts using endpoint detection and response (EDR) tools to detect suspicious activity. 3. Apply application whitelisting to prevent unauthorized DLLs from loading in the context of NAVER MYBOX Explorer. 4. Until an official patch is released, consider uninstalling or disabling NAVER MYBOX Explorer on critical systems if feasible. 5. Educate users about the risks of local privilege escalation and enforce strong authentication and access controls to minimize the chance of initial compromise. 6. Maintain up-to-date backups and incident response plans to quickly recover from potential exploitation. 7. Once a patch is available, prioritize testing and deployment across all affected systems to remediate the vulnerability promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
naver
Date Reserved
2025-08-28T07:54:43.758Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b010acad5a09ad006b00c4

Added to database: 8/28/2025, 8:17:48 AM

Last enriched: 9/4/2025, 6:32:33 PM

Last updated: 10/12/2025, 8:50:12 PM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats