Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64457: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in JetBrains ReSharper, Rider and dotTrace

0
Medium
VulnerabilityCVE-2025-64457cvecve-2025-64457cwe-367
Published: Mon Nov 10 2025 (11/10/2025, 13:28:23 UTC)
Source: CVE Database V5
Vendor/Project: JetBrains
Product: ReSharper, Rider and dotTrace

Description

In JetBrains ReSharper, Rider and dotTrace before 2025.2.5 local privilege escalation was possible via race condition

AI-Powered Analysis

AILast updated: 12/19/2025, 10:32:10 UTC

Technical Analysis

CVE-2025-64457 is a vulnerability classified under CWE-367, indicating a time-of-check to time-of-use (TOCTOU) race condition in JetBrains' ReSharper, Rider, and dotTrace products prior to version 2025.2.5. This race condition occurs when the software checks a condition (such as permissions or resource state) and then uses the resource based on that check, but the state changes between these two operations due to concurrent processes or threads. An attacker with local access and limited privileges can exploit this timing window to manipulate the resource state after the check but before use, thereby escalating their privileges on the system. The vulnerability requires local access and some level of privileges (PR:L) but does not require user interaction (UI:N). The attack complexity is high (AC:H), meaning exploitation requires precise timing or conditions. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting system-wide privileges. The CVSS score of 4.2 reflects a medium severity, with impacts on confidentiality and integrity but no impact on availability. No public exploits have been reported, and JetBrains has reserved and published the CVE recently, suggesting the vulnerability is newly disclosed. The affected products are widely used in software development environments for code analysis, refactoring, and performance profiling, making this a concern for developer workstations and build environments.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of development environments. Successful exploitation could allow an attacker with local access to escalate privileges, potentially gaining unauthorized access to sensitive source code, intellectual property, or build configurations. This could lead to further compromise of development pipelines, insertion of malicious code, or disruption of software delivery processes. Although the vulnerability does not directly impact availability, the resulting privilege escalation could facilitate broader attacks. Organizations with large software development teams or those relying heavily on JetBrains tools are at higher risk. The medium severity and high attack complexity reduce the likelihood of widespread exploitation but do not eliminate the risk, especially from insider threats or attackers who have already gained limited access. The absence of known exploits in the wild provides a window for proactive mitigation. Failure to address this vulnerability could undermine trust in software integrity and increase exposure to supply chain attacks.

Mitigation Recommendations

To mitigate CVE-2025-64457, European organizations should immediately update all affected JetBrains products—ReSharper, Rider, and dotTrace—to version 2025.2.5 or later once available. Until patches are applied, restrict local access to developer workstations and build servers to trusted personnel only, employing strict access controls and monitoring. Implement endpoint detection and response (EDR) solutions to detect unusual privilege escalation attempts or race condition exploitation patterns. Conduct regular audits of user privileges and system logs to identify suspicious activities. Employ application whitelisting and sandboxing where feasible to limit the impact of potential exploits. Educate developers and IT staff about the risks of local privilege escalation vulnerabilities and the importance of timely patching. Additionally, review and harden build and deployment pipelines to minimize the risk of compromised developer environments affecting production systems. Coordinate with JetBrains support channels for any interim mitigation advice and monitor for updates or advisories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
JetBrains
Date Reserved
2025-11-04T14:34:02.045Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6911ecfbbb27cbde2e7c666b

Added to database: 11/10/2025, 1:47:39 PM

Last enriched: 12/19/2025, 10:32:10 AM

Last updated: 1/7/2026, 6:10:34 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats