Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64456: CWE-347 in JetBrains ReSharper

0
High
VulnerabilityCVE-2025-64456cvecve-2025-64456cwe-347
Published: Mon Nov 10 2025 (11/10/2025, 13:28:03 UTC)
Source: CVE Database V5
Vendor/Project: JetBrains
Product: ReSharper

Description

In JetBrains ReSharper before 2025.2.4 missing signature verification in DPA Collector allows local privilege escalation

AI-Powered Analysis

AILast updated: 11/17/2025, 14:30:15 UTC

Technical Analysis

CVE-2025-64456 is a vulnerability identified in JetBrains ReSharper, a widely used developer productivity tool integrated into Microsoft Visual Studio. The issue stems from a missing signature verification step in the DPA Collector component prior to version 2025.2.4. This component is responsible for collecting diagnostic or performance data, and the lack of cryptographic signature validation allows a local attacker to inject or manipulate data or code that the DPA Collector processes. Because the system implicitly trusts this data, an attacker with limited privileges can exploit this flaw to escalate their privileges on the host machine, gaining higher-level access than originally permitted. The vulnerability is classified under CWE-347, which relates to improper verification of cryptographic signatures. The CVSS v3.1 score of 8.4 reflects a high severity, with an attack vector limited to local access (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and a scope change (S:C) that affects confidentiality and integrity with high impact (C:H/I:H) but no impact on availability (A:N). No public exploits have been reported yet, but the vulnerability poses a significant risk in environments where ReSharper is installed and local user accounts are not tightly controlled. The flaw could be leveraged by malicious insiders or malware that gains initial foothold with limited privileges to escalate their access and potentially compromise sensitive codebases or development environments.

Potential Impact

For European organizations, the impact of CVE-2025-64456 is substantial, particularly for those heavily reliant on JetBrains ReSharper in their software development workflows. Successful exploitation can lead to unauthorized access to confidential source code, intellectual property theft, and potential sabotage of development environments. This could disrupt software delivery pipelines and damage organizational reputation. Since the vulnerability requires local access, the risk is heightened in environments with many users or insufficient endpoint security controls. The integrity of development tools and environments is critical in Europe’s technology and financial sectors, making this vulnerability a vector for advanced persistent threats or insider attacks. Additionally, compromised developer machines could serve as pivot points for broader network intrusions. The lack of known exploits currently limits immediate widespread impact, but the high severity score and potential for privilege escalation warrant urgent attention.

Mitigation Recommendations

European organizations should prioritize updating JetBrains ReSharper to version 2025.2.4 or later as soon as the patch is available. Until then, restrict local access to systems running ReSharper to trusted personnel only and enforce strict endpoint security policies, including application whitelisting and behavioral monitoring to detect anomalous privilege escalation attempts. Employ robust user account management, ensuring least privilege principles and disabling unnecessary local accounts. Regularly audit installed software versions across developer workstations to identify vulnerable instances. Network segmentation can limit lateral movement if an attacker exploits this vulnerability. Additionally, consider deploying host-based intrusion detection systems (HIDS) to monitor for suspicious activity related to the DPA Collector component. Educate developers and IT staff about the risks of local privilege escalation and the importance of timely patching.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
JetBrains
Date Reserved
2025-11-04T14:34:01.215Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6911ecfbbb27cbde2e7c6668

Added to database: 11/10/2025, 1:47:39 PM

Last enriched: 11/17/2025, 2:30:15 PM

Last updated: 11/22/2025, 1:00:06 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats