CVE-2025-7073: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Bitdefender Total Security
A local privilege escalation vulnerability in Bitdefender Total Security versions prior to 27.0.47.241 allows low-privileged attackers to elevate privileges. The issue arises from bdservicehost.exe deleting files from a user-writable directory (C:\ProgramData\Atc\Feedback) without proper symbolic link validation, enabling arbitrary file deletion. This issue is chained with a file copy operation during network events and a filter driver bypass via DLL injection to achieve arbitrary file copy and code execution as elevated user.
AI Analysis
Technical Summary
CVE-2025-7073 is a local privilege escalation vulnerability identified in Bitdefender Total Security versions prior to 27.0.47.241. The root cause is improper link resolution before file access (CWE-59) in the bdservicehost.exe process. Specifically, this process deletes files located in the user-writable directory C:\ProgramData\Atc\Feedback without validating whether these files are symbolic links. This lack of validation enables attackers with low privileges to create symbolic links that point to arbitrary files elsewhere on the system, causing bdservicehost.exe to delete unintended files. The vulnerability is exploited through a multi-step chain: first, the attacker leverages the symbolic link vulnerability to delete arbitrary files; second, a file copy operation triggered during network events is abused to copy files arbitrarily; third, a filter driver bypass is achieved via DLL injection, allowing the attacker to execute code with elevated privileges. The exploit requires local access but no user interaction, and the scope includes confidentiality, integrity, and availability impacts due to arbitrary file deletion and code execution. The CVSS 4.0 vector (AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) indicates a high complexity attack with partial privileges required but no user interaction. No patches are currently linked, and no known exploits are reported in the wild as of the publication date.
Potential Impact
The vulnerability allows attackers with low-level local access to escalate privileges to elevated user levels, potentially SYSTEM or administrator. This can lead to full system compromise, unauthorized access to sensitive data, and disruption of security controls. Arbitrary file deletion can cause denial of service by removing critical system or application files. The ability to execute code with elevated privileges undermines the integrity and confidentiality of affected systems. Organizations relying on Bitdefender Total Security for endpoint protection may face increased risk of compromise, especially in environments where local access controls are weak or where attackers can gain initial footholds through other means. The chained exploitation technique increases the attack surface and complexity, making mitigation more urgent. The lack of known exploits currently reduces immediate risk but does not diminish the potential impact if weaponized. This vulnerability is particularly concerning for enterprises and government agencies that rely on Bitdefender for critical endpoint defense.
Mitigation Recommendations
1. Immediately monitor for updates from Bitdefender and apply patches for Total Security version 27.0.47.241 or later as soon as they become available. 2. Restrict write permissions to the C:\ProgramData\Atc\Feedback directory to trusted system processes only, preventing unprivileged users from creating symbolic links or files in this location. 3. Implement application whitelisting and integrity monitoring to detect unauthorized DLL injections and filter driver bypass attempts. 4. Employ endpoint detection and response (EDR) solutions to monitor bdservicehost.exe behavior for unusual file deletions or network-triggered file copy operations. 5. Conduct regular audits of local user privileges and remove unnecessary local accounts to reduce the attack surface. 6. Educate system administrators about the risks of symbolic link attacks and ensure secure configuration of antivirus and endpoint security products. 7. Use system hardening techniques to limit the ability of low-privileged users to manipulate system directories and services. 8. Consider isolating critical endpoints or using virtualization/containerization to limit the impact of potential exploitation.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, India, Japan, South Korea, Brazil, Russia, Italy, Spain
CVE-2025-7073: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Bitdefender Total Security
Description
A local privilege escalation vulnerability in Bitdefender Total Security versions prior to 27.0.47.241 allows low-privileged attackers to elevate privileges. The issue arises from bdservicehost.exe deleting files from a user-writable directory (C:\ProgramData\Atc\Feedback) without proper symbolic link validation, enabling arbitrary file deletion. This issue is chained with a file copy operation during network events and a filter driver bypass via DLL injection to achieve arbitrary file copy and code execution as elevated user.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-7073 is a local privilege escalation vulnerability identified in Bitdefender Total Security versions prior to 27.0.47.241. The root cause is improper link resolution before file access (CWE-59) in the bdservicehost.exe process. Specifically, this process deletes files located in the user-writable directory C:\ProgramData\Atc\Feedback without validating whether these files are symbolic links. This lack of validation enables attackers with low privileges to create symbolic links that point to arbitrary files elsewhere on the system, causing bdservicehost.exe to delete unintended files. The vulnerability is exploited through a multi-step chain: first, the attacker leverages the symbolic link vulnerability to delete arbitrary files; second, a file copy operation triggered during network events is abused to copy files arbitrarily; third, a filter driver bypass is achieved via DLL injection, allowing the attacker to execute code with elevated privileges. The exploit requires local access but no user interaction, and the scope includes confidentiality, integrity, and availability impacts due to arbitrary file deletion and code execution. The CVSS 4.0 vector (AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) indicates a high complexity attack with partial privileges required but no user interaction. No patches are currently linked, and no known exploits are reported in the wild as of the publication date.
Potential Impact
The vulnerability allows attackers with low-level local access to escalate privileges to elevated user levels, potentially SYSTEM or administrator. This can lead to full system compromise, unauthorized access to sensitive data, and disruption of security controls. Arbitrary file deletion can cause denial of service by removing critical system or application files. The ability to execute code with elevated privileges undermines the integrity and confidentiality of affected systems. Organizations relying on Bitdefender Total Security for endpoint protection may face increased risk of compromise, especially in environments where local access controls are weak or where attackers can gain initial footholds through other means. The chained exploitation technique increases the attack surface and complexity, making mitigation more urgent. The lack of known exploits currently reduces immediate risk but does not diminish the potential impact if weaponized. This vulnerability is particularly concerning for enterprises and government agencies that rely on Bitdefender for critical endpoint defense.
Mitigation Recommendations
1. Immediately monitor for updates from Bitdefender and apply patches for Total Security version 27.0.47.241 or later as soon as they become available. 2. Restrict write permissions to the C:\ProgramData\Atc\Feedback directory to trusted system processes only, preventing unprivileged users from creating symbolic links or files in this location. 3. Implement application whitelisting and integrity monitoring to detect unauthorized DLL injections and filter driver bypass attempts. 4. Employ endpoint detection and response (EDR) solutions to monitor bdservicehost.exe behavior for unusual file deletions or network-triggered file copy operations. 5. Conduct regular audits of local user privileges and remove unnecessary local accounts to reduce the attack surface. 6. Educate system administrators about the risks of symbolic link attacks and ensure secure configuration of antivirus and endpoint security products. 7. Use system hardening techniques to limit the ability of low-privileged users to manipulate system directories and services. 8. Consider isolating critical endpoints or using virtualization/containerization to limit the impact of potential exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Bitdefender
- Date Reserved
- 2025-07-04T15:58:42.058Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693945e9681246c13df087ff
Added to database: 12/10/2025, 10:05:29 AM
Last enriched: 3/31/2026, 7:29:28 PM
Last updated: 5/9/2026, 5:31:41 AM
Views: 213
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.