CVE-2025-59485: Incorrect default permissions in Intercom, Inc. Security Point (Windows) of MaLion
CVE-2025-59485 is a vulnerability in Intercom, Inc. 's Security Point (Windows) component of MaLion prior to version 5. 3. 4. It involves incorrect default permissions that allow a logged-in user with limited privileges to place arbitrary files into a specific folder. If the attacker places a specially crafted DLL file, it can lead to arbitrary code execution with SYSTEM privileges. The vulnerability does not require user interaction but does require the attacker to have login access to the affected system. The CVSS score is 3. 3, indicating a low severity primarily due to the requirement of local login and limited impact on confidentiality and availability. No known exploits are currently reported in the wild.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-59485 affects the Windows client of Security Point, a product of MaLion by Intercom, Inc., in versions prior to 5.3.4. The root cause is incorrect default permissions on a specific folder within the product's installation directory. This misconfiguration allows any user who can log into the Windows system to place arbitrary files into this folder. If the attacker places a malicious DLL file crafted to exploit this vulnerability, it can be loaded and executed with SYSTEM-level privileges, effectively allowing privilege escalation from a low-privileged user to full system control. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N) is needed once logged in. The scope is unchanged (S:U), and the impact affects integrity (I:L) but not confidentiality or availability. Although the CVSS score is low (3.3), the ability to execute code as SYSTEM is significant in environments where multiple users share access. No public exploits have been reported, and no patches or mitigations are linked in the provided data, but upgrading to version 5.3.4 or later is implied as the fix. This vulnerability highlights the importance of secure default permissions and the risks posed by local privilege escalation vectors in endpoint security products.
Potential Impact
For European organizations, the impact of CVE-2025-59485 depends largely on the deployment context of Security Point (Windows) of MaLion. In environments where multiple users have login access to the same endpoint, such as shared workstations or terminal servers, this vulnerability could allow a low-privileged user to escalate privileges to SYSTEM, potentially leading to full system compromise. This could enable attackers to install persistent malware, manipulate security controls, or move laterally within the network. However, since the vulnerability requires local login and does not affect confidentiality or availability directly, its impact is somewhat limited in isolated or well-segmented environments. Organizations with strict access controls and endpoint management may see reduced risk. Nonetheless, in sectors with high-value targets or sensitive data—such as finance, government, or critical infrastructure—the ability to gain SYSTEM privileges could facilitate further attacks. The lack of known exploits in the wild reduces immediate risk but should not lead to complacency. The vulnerability could be leveraged in insider threat scenarios or by attackers who have already gained limited access.
Mitigation Recommendations
To mitigate CVE-2025-59485, European organizations should: 1) Immediately upgrade Security Point (Windows) of MaLion to version 5.3.4 or later, where the incorrect default permissions issue is resolved. 2) Audit and restrict local user login permissions to minimize the number of users who can access affected systems. 3) Implement application whitelisting and DLL loading restrictions to prevent unauthorized DLLs from being loaded by the product. 4) Monitor file system changes in the specific folder identified as vulnerable to detect unauthorized file placements. 5) Employ endpoint detection and response (EDR) tools to identify suspicious privilege escalation attempts. 6) Harden Windows security policies, including restricting write permissions on critical directories and enforcing least privilege principles. 7) Conduct regular security awareness training to reduce insider threat risks. 8) If upgrading is not immediately possible, consider temporary compensating controls such as restricting access to the vulnerable folder or isolating affected systems. These measures go beyond generic patching advice by focusing on access control, monitoring, and layered defense strategies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-59485: Incorrect default permissions in Intercom, Inc. Security Point (Windows) of MaLion
Description
CVE-2025-59485 is a vulnerability in Intercom, Inc. 's Security Point (Windows) component of MaLion prior to version 5. 3. 4. It involves incorrect default permissions that allow a logged-in user with limited privileges to place arbitrary files into a specific folder. If the attacker places a specially crafted DLL file, it can lead to arbitrary code execution with SYSTEM privileges. The vulnerability does not require user interaction but does require the attacker to have login access to the affected system. The CVSS score is 3. 3, indicating a low severity primarily due to the requirement of local login and limited impact on confidentiality and availability. No known exploits are currently reported in the wild.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-59485 affects the Windows client of Security Point, a product of MaLion by Intercom, Inc., in versions prior to 5.3.4. The root cause is incorrect default permissions on a specific folder within the product's installation directory. This misconfiguration allows any user who can log into the Windows system to place arbitrary files into this folder. If the attacker places a malicious DLL file crafted to exploit this vulnerability, it can be loaded and executed with SYSTEM-level privileges, effectively allowing privilege escalation from a low-privileged user to full system control. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N) is needed once logged in. The scope is unchanged (S:U), and the impact affects integrity (I:L) but not confidentiality or availability. Although the CVSS score is low (3.3), the ability to execute code as SYSTEM is significant in environments where multiple users share access. No public exploits have been reported, and no patches or mitigations are linked in the provided data, but upgrading to version 5.3.4 or later is implied as the fix. This vulnerability highlights the importance of secure default permissions and the risks posed by local privilege escalation vectors in endpoint security products.
Potential Impact
For European organizations, the impact of CVE-2025-59485 depends largely on the deployment context of Security Point (Windows) of MaLion. In environments where multiple users have login access to the same endpoint, such as shared workstations or terminal servers, this vulnerability could allow a low-privileged user to escalate privileges to SYSTEM, potentially leading to full system compromise. This could enable attackers to install persistent malware, manipulate security controls, or move laterally within the network. However, since the vulnerability requires local login and does not affect confidentiality or availability directly, its impact is somewhat limited in isolated or well-segmented environments. Organizations with strict access controls and endpoint management may see reduced risk. Nonetheless, in sectors with high-value targets or sensitive data—such as finance, government, or critical infrastructure—the ability to gain SYSTEM privileges could facilitate further attacks. The lack of known exploits in the wild reduces immediate risk but should not lead to complacency. The vulnerability could be leveraged in insider threat scenarios or by attackers who have already gained limited access.
Mitigation Recommendations
To mitigate CVE-2025-59485, European organizations should: 1) Immediately upgrade Security Point (Windows) of MaLion to version 5.3.4 or later, where the incorrect default permissions issue is resolved. 2) Audit and restrict local user login permissions to minimize the number of users who can access affected systems. 3) Implement application whitelisting and DLL loading restrictions to prevent unauthorized DLLs from being loaded by the product. 4) Monitor file system changes in the specific folder identified as vulnerable to detect unauthorized file placements. 5) Employ endpoint detection and response (EDR) tools to identify suspicious privilege escalation attempts. 6) Harden Windows security policies, including restricting write permissions on critical directories and enforcing least privilege principles. 7) Conduct regular security awareness training to reduce insider threat risks. 8) If upgrading is not immediately possible, consider temporary compensating controls such as restricting access to the vulnerable folder or isolating affected systems. These measures go beyond generic patching advice by focusing on access control, monitoring, and layered defense strategies.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-11-18T02:02:14.649Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 69255ab1292ce6fc00b965a7
Added to database: 11/25/2025, 7:28:49 AM
Last enriched: 12/2/2025, 2:50:57 PM
Last updated: 1/10/2026, 10:13:50 PM
Views: 85
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.