CVE-2025-22890
Published: 06 February 2025
Summary
CVE-2025-22890 is a high-severity Execution with Unnecessary Privileges (CWE-250) vulnerability in Hummingheads Defense Platform. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 12.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates execution with unnecessary privileges by ensuring the Defense Platform software and associated processes operate with the minimum privileges required, preventing escalation to SYSTEM level.
Requires timely flaw remediation through patching the specific privilege escalation vulnerability in Defense Platform Home Edition Ver.3.9.51.x and earlier.
Enforces access control policies to block the specific local operation that allows low-privileged attackers to obtain SYSTEM privileges on the Windows host.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a local privilege escalation vulnerability (CWE-250) allowing low-privileged attackers to gain SYSTEM access on Windows, directly enabling Exploitation for Privilege Escalation (T1068).
NVD Description
Execution with unnecessary privileges issue exists in Defense Platform Home Edition Ver.3.9.51.x and earlier. If an attacker performs a specific operation, SYSTEM privilege of the Windows system where the product is running may be obtained.
Deeper analysisAI
CVE-2025-22890 is an execution with unnecessary privileges vulnerability, classified under CWE-250, affecting Defense Platform Home Edition versions 3.9.51.x and earlier. This issue resides in the software running on Windows systems, where it allows escalation beyond intended privilege levels. The vulnerability was published on 2025-02-06 and carries a CVSS v3.1 base score of 8.8 (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), highlighting its high severity due to local attack vector, low complexity, and significant impacts.
A local attacker with low privileges can exploit the vulnerability by performing a specific operation, requiring no user interaction. Successful exploitation grants the attacker SYSTEM privileges on the Windows host where the product is installed, enabling high-impact compromise of confidentiality, integrity, and availability with a scope change to the system.
Advisories providing further details, including potential mitigations and patches, are available at https://jvn.jp/en/jp/JVN66673020/ and https://www.hummingheads.co.jp/dep/storelist/.
Details
- CWE(s)