Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69875: n/a

0
High
VulnerabilityCVE-2025-69875cvecve-2025-69875
Published: Tue Feb 03 2026 (02/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-69875 is a high-severity local privilege escalation vulnerability in Quick Heal Total Security 23. 0. 0. It arises from insufficient validation of restore paths and improper permission handling in the quarantine management component, allowing low-privileged users to restore quarantined files into protected system directories. Exploiting this flaw, an attacker can place malicious files in high-privilege locations, potentially gaining elevated system privileges without user interaction. The vulnerability requires local access and low privileges but no user interaction, making it a significant risk for endpoint security. No known exploits are currently reported in the wild. Organizations using Quick Heal Total Security should prioritize patching once available and implement strict local user access controls to mitigate risk. European organizations with deployments of this product, especially in countries with high adoption of Quick Heal, face increased risk of targeted privilege escalation attacks. Mitigation involves monitoring and restricting local user permissions and applying vendor patches promptly upon release.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:48:29 UTC

Technical Analysis

CVE-2025-69875 is a vulnerability identified in Quick Heal Total Security version 23.0.0, specifically within its quarantine management component. The root cause is insufficient validation of file restore paths combined with improper permission handling. This flaw allows a low-privileged local user to restore quarantined files into protected system directories, which are typically reserved for high-privilege or system-level files. By exploiting this vulnerability, an attacker can place arbitrary files in sensitive locations, potentially leading to privilege escalation. The vulnerability is categorized under CWE-281 (Improper Restriction of Operations within the Bounds of a Memory Buffer), CWE-269 (Improper Privilege Management), and CWE-552 (Files or Directories Accessible to External Parties), indicating issues with access control and validation. The CVSS v3.1 score is 7.8, reflecting high severity due to the impact on confidentiality, integrity, and availability (all rated high), with attack vector local, low attack complexity, low privileges required, and no user interaction needed. Although no exploits are currently known in the wild, the vulnerability presents a significant risk because it enables attackers with limited access to escalate privileges and potentially compromise entire systems. The lack of available patches at the time of reporting necessitates immediate attention to access controls and monitoring. This vulnerability is particularly critical for environments where Quick Heal Total Security is deployed on endpoints that multiple users can access or where local user accounts are not tightly controlled.

Potential Impact

For European organizations, this vulnerability poses a significant risk to endpoint security, especially in environments where Quick Heal Total Security is widely deployed. Successful exploitation can lead to unauthorized privilege escalation, allowing attackers to execute arbitrary code with elevated privileges, compromise system integrity, and potentially gain persistent access. This can result in data breaches, disruption of critical services, and lateral movement within networks. The impact is heightened in sectors with strict regulatory requirements for data protection, such as finance, healthcare, and government, where unauthorized access could lead to severe compliance violations and reputational damage. Additionally, organizations with shared or multi-user systems are at increased risk, as low-privileged users could exploit this flaw to escalate privileges. The absence of known exploits in the wild currently reduces immediate threat but does not eliminate the risk, as attackers may develop exploits once the vulnerability is publicly disclosed. The vulnerability's local attack vector means that insider threats or compromised user accounts could be leveraged to exploit this issue.

Mitigation Recommendations

1. Immediately restrict local user permissions to the minimum necessary, preventing low-privileged users from accessing or restoring quarantined files. 2. Implement strict access controls and monitoring on the directories used by Quick Heal Total Security for quarantine and system files to detect unauthorized file placements. 3. Use application whitelisting and integrity monitoring tools to alert on or block unauthorized modifications in protected system directories. 4. Educate system administrators and users about the risks of local privilege escalation and enforce strong endpoint security policies. 5. Monitor vendor communications closely and apply security patches or updates as soon as they become available for Quick Heal Total Security. 6. Consider deploying additional endpoint detection and response (EDR) solutions capable of detecting suspicious local file operations and privilege escalation attempts. 7. Conduct regular audits of local user accounts and permissions to ensure no unnecessary privileges are granted. 8. If possible, isolate critical systems or use virtualization/containerization to limit the impact of potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6982fcd4f9fa50a62f766339

Added to database: 2/4/2026, 8:01:24 AM

Last enriched: 2/11/2026, 11:48:29 AM

Last updated: 3/23/2026, 9:14:03 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses