CVE-2025-64456: CWE-347 in JetBrains ReSharper
In JetBrains ReSharper before 2025.2.4 missing signature verification in DPA Collector allows local privilege escalation
AI Analysis
Technical Summary
CVE-2025-64456 is a vulnerability identified in JetBrains ReSharper, a widely used productivity extension for Microsoft Visual Studio. The issue is categorized under CWE-347, which involves improper verification of cryptographic signatures. Specifically, the vulnerability exists in the DPA Collector component of ReSharper versions prior to 2025.2.4, where signature verification is missing or insufficient. This flaw allows an attacker who already has local access with limited privileges to escalate their privileges on the affected system. The vulnerability does not require user interaction and has a low attack complexity, but it does require the attacker to have some level of local access (AV:L). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially compromised component. The impact on confidentiality and integrity is high, as the attacker can potentially execute code or access sensitive data with elevated privileges, but availability is not affected. No public exploits are known at this time, but the high CVSS score of 8.4 indicates a significant risk if exploited. The vulnerability highlights the importance of proper signature verification in software components that handle privileged operations. Since ReSharper is a development tool, the vulnerability could be leveraged to compromise developer machines, potentially leading to broader supply chain or code integrity issues.
Potential Impact
The primary impact of CVE-2025-64456 is local privilege escalation, which can allow an attacker with limited local access to gain higher privileges on a developer's machine. This can lead to unauthorized access to sensitive source code, intellectual property, and development environments. Elevated privileges may also enable attackers to install persistent backdoors, manipulate build processes, or tamper with software artifacts, potentially affecting software supply chain integrity. Organizations relying on ReSharper for development are at risk of internal compromise, especially if endpoint security is weak or if attackers gain initial foothold through other means. The vulnerability does not directly affect availability but poses a significant threat to confidentiality and integrity. The scope change indicates that the attacker can affect system components beyond the initial vulnerable process, increasing the potential damage. Although no exploits are currently known in the wild, the high CVSS score and the nature of the vulnerability suggest that motivated attackers could develop effective exploits, especially in environments where ReSharper is widely used.
Mitigation Recommendations
1. Apply patches or updates from JetBrains as soon as they become available for ReSharper 2025.2.4 or later, which address the signature verification flaw in the DPA Collector. 2. Until patches are available, restrict local access to developer machines running ReSharper by enforcing strict access controls and using endpoint protection solutions to detect suspicious privilege escalation attempts. 3. Implement application whitelisting and monitor for unauthorized modifications or executions related to ReSharper components. 4. Conduct regular audits of user privileges and remove unnecessary local accounts or permissions that could be leveraged by attackers. 5. Educate developers and IT staff about the risk of local privilege escalation vulnerabilities and encourage reporting of unusual system behavior. 6. Use host-based intrusion detection systems (HIDS) to monitor for anomalous activities indicative of privilege escalation attempts. 7. Consider isolating development environments or using virtual machines to limit the impact of potential compromises. 8. Maintain comprehensive logging and monitoring to facilitate rapid detection and response to exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Canada, Australia, India, China
CVE-2025-64456: CWE-347 in JetBrains ReSharper
Description
In JetBrains ReSharper before 2025.2.4 missing signature verification in DPA Collector allows local privilege escalation
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-64456 is a vulnerability identified in JetBrains ReSharper, a widely used productivity extension for Microsoft Visual Studio. The issue is categorized under CWE-347, which involves improper verification of cryptographic signatures. Specifically, the vulnerability exists in the DPA Collector component of ReSharper versions prior to 2025.2.4, where signature verification is missing or insufficient. This flaw allows an attacker who already has local access with limited privileges to escalate their privileges on the affected system. The vulnerability does not require user interaction and has a low attack complexity, but it does require the attacker to have some level of local access (AV:L). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially compromised component. The impact on confidentiality and integrity is high, as the attacker can potentially execute code or access sensitive data with elevated privileges, but availability is not affected. No public exploits are known at this time, but the high CVSS score of 8.4 indicates a significant risk if exploited. The vulnerability highlights the importance of proper signature verification in software components that handle privileged operations. Since ReSharper is a development tool, the vulnerability could be leveraged to compromise developer machines, potentially leading to broader supply chain or code integrity issues.
Potential Impact
The primary impact of CVE-2025-64456 is local privilege escalation, which can allow an attacker with limited local access to gain higher privileges on a developer's machine. This can lead to unauthorized access to sensitive source code, intellectual property, and development environments. Elevated privileges may also enable attackers to install persistent backdoors, manipulate build processes, or tamper with software artifacts, potentially affecting software supply chain integrity. Organizations relying on ReSharper for development are at risk of internal compromise, especially if endpoint security is weak or if attackers gain initial foothold through other means. The vulnerability does not directly affect availability but poses a significant threat to confidentiality and integrity. The scope change indicates that the attacker can affect system components beyond the initial vulnerable process, increasing the potential damage. Although no exploits are currently known in the wild, the high CVSS score and the nature of the vulnerability suggest that motivated attackers could develop effective exploits, especially in environments where ReSharper is widely used.
Mitigation Recommendations
1. Apply patches or updates from JetBrains as soon as they become available for ReSharper 2025.2.4 or later, which address the signature verification flaw in the DPA Collector. 2. Until patches are available, restrict local access to developer machines running ReSharper by enforcing strict access controls and using endpoint protection solutions to detect suspicious privilege escalation attempts. 3. Implement application whitelisting and monitor for unauthorized modifications or executions related to ReSharper components. 4. Conduct regular audits of user privileges and remove unnecessary local accounts or permissions that could be leveraged by attackers. 5. Educate developers and IT staff about the risk of local privilege escalation vulnerabilities and encourage reporting of unusual system behavior. 6. Use host-based intrusion detection systems (HIDS) to monitor for anomalous activities indicative of privilege escalation attempts. 7. Consider isolating development environments or using virtual machines to limit the impact of potential compromises. 8. Maintain comprehensive logging and monitoring to facilitate rapid detection and response to exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- JetBrains
- Date Reserved
- 2025-11-04T14:34:01.215Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6911ecfbbb27cbde2e7c6668
Added to database: 11/10/2025, 1:47:39 PM
Last enriched: 2/27/2026, 4:06:47 AM
Last updated: 3/23/2026, 1:45:08 PM
Views: 228
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.