CVE-2025-0893
Published: 19 February 2025
Summary
CVE-2025-0893 is a high-severity Improper Privilege Management (CWE-269) vulnerability in Broadcom (inferred from references). Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 24.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the privilege escalation flaw by requiring identification, reporting, and correction of vulnerabilities like CVE-2025-0893 through patching to SymDiag 3.0.79 or later.
Enforces least privilege to mitigate improper privilege management (CWE-269), limiting the scope and impact of local low-privilege escalation in SymDiag.
Requires enforcement of approved access authorizations, helping to block unauthorized privilege escalations attempted via the SymDiag vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local privilege escalation vulnerability due to improper privilege management directly enables T1068 Exploitation for Privilege Escalation, allowing low-privileged local attackers to achieve full system compromise.
NVD Description
Symantec Diagnostic Tool (SymDiag), prior to 3.0.79, may be susceptible to a Privilege Escalation vulnerability.
Deeper analysisAI
CVE-2025-0893 is a Privilege Escalation vulnerability in the Symantec Diagnostic Tool (SymDiag), affecting versions prior to 3.0.79. Published on 2025-02-19, it has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-269 (Improper Privilege Management).
A local attacker with low privileges (PR:L) can exploit this vulnerability with low attack complexity and no user interaction. Exploitation grants high-impact access to confidentiality, integrity, and availability (C:H/I:H/A:H), enabling full system compromise within the unchanged scope.
Broadcom's security advisory provides mitigation guidance, available at https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25417. Upgrading to SymDiag 3.0.79 or later addresses the issue in affected versions.
Details
- CWE(s)