Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59485: Incorrect default permissions in Intercom, Inc. Security Point (Windows) of MaLion

0
Low
VulnerabilityCVE-2025-59485cvecve-2025-59485
Published: Tue Nov 25 2025 (11/25/2025, 07:20:38 UTC)
Source: CVE Database V5
Vendor/Project: Intercom, Inc.
Product: Security Point (Windows) of MaLion

Description

CVE-2025-59485 is a vulnerability in Intercom, Inc. 's Security Point (Windows) component of MaLion prior to version 5. 3. 4. It involves incorrect default permissions that allow a logged-in user with limited privileges to place arbitrary files into a specific folder. If the attacker places a specially crafted DLL file, it can lead to arbitrary code execution with SYSTEM privileges. The vulnerability does not require user interaction but does require the attacker to have login access to the affected system. The CVSS score is 3. 3, indicating a low severity primarily due to the requirement of local login and limited impact on confidentiality and availability. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 12/02/2025, 14:50:57 UTC

Technical Analysis

The vulnerability identified as CVE-2025-59485 affects the Windows client of Security Point, a product of MaLion by Intercom, Inc., in versions prior to 5.3.4. The root cause is incorrect default permissions on a specific folder within the product's installation directory. This misconfiguration allows any user who can log into the Windows system to place arbitrary files into this folder. If the attacker places a malicious DLL file crafted to exploit this vulnerability, it can be loaded and executed with SYSTEM-level privileges, effectively allowing privilege escalation from a low-privileged user to full system control. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N) is needed once logged in. The scope is unchanged (S:U), and the impact affects integrity (I:L) but not confidentiality or availability. Although the CVSS score is low (3.3), the ability to execute code as SYSTEM is significant in environments where multiple users share access. No public exploits have been reported, and no patches or mitigations are linked in the provided data, but upgrading to version 5.3.4 or later is implied as the fix. This vulnerability highlights the importance of secure default permissions and the risks posed by local privilege escalation vectors in endpoint security products.

Potential Impact

For European organizations, the impact of CVE-2025-59485 depends largely on the deployment context of Security Point (Windows) of MaLion. In environments where multiple users have login access to the same endpoint, such as shared workstations or terminal servers, this vulnerability could allow a low-privileged user to escalate privileges to SYSTEM, potentially leading to full system compromise. This could enable attackers to install persistent malware, manipulate security controls, or move laterally within the network. However, since the vulnerability requires local login and does not affect confidentiality or availability directly, its impact is somewhat limited in isolated or well-segmented environments. Organizations with strict access controls and endpoint management may see reduced risk. Nonetheless, in sectors with high-value targets or sensitive data—such as finance, government, or critical infrastructure—the ability to gain SYSTEM privileges could facilitate further attacks. The lack of known exploits in the wild reduces immediate risk but should not lead to complacency. The vulnerability could be leveraged in insider threat scenarios or by attackers who have already gained limited access.

Mitigation Recommendations

To mitigate CVE-2025-59485, European organizations should: 1) Immediately upgrade Security Point (Windows) of MaLion to version 5.3.4 or later, where the incorrect default permissions issue is resolved. 2) Audit and restrict local user login permissions to minimize the number of users who can access affected systems. 3) Implement application whitelisting and DLL loading restrictions to prevent unauthorized DLLs from being loaded by the product. 4) Monitor file system changes in the specific folder identified as vulnerable to detect unauthorized file placements. 5) Employ endpoint detection and response (EDR) tools to identify suspicious privilege escalation attempts. 6) Harden Windows security policies, including restricting write permissions on critical directories and enforcing least privilege principles. 7) Conduct regular security awareness training to reduce insider threat risks. 8) If upgrading is not immediately possible, consider temporary compensating controls such as restricting access to the vulnerable folder or isolating affected systems. These measures go beyond generic patching advice by focusing on access control, monitoring, and layered defense strategies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2025-11-18T02:02:14.649Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69255ab1292ce6fc00b965a7

Added to database: 11/25/2025, 7:28:49 AM

Last enriched: 12/2/2025, 2:50:57 PM

Last updated: 1/10/2026, 10:13:50 PM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats