CVE-2025-0889

7.8 HIGH

📋 TL;DR

This vulnerability allows local authenticated attackers to elevate privileges on systems running Privilege Management for Windows versions before 25.2. Attackers can manipulate COM objects to gain higher privileges when EPM policies allow automatic privilege elevation of user processes. Only affects systems with BeyondTrust's Privilege Management for Windows installed.

💻 Affected Systems

Products:
  • BeyondTrust Privilege Management for Windows
Versions: All versions prior to 25.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires EPM policies that allow automatic privilege elevation of user processes. Systems without such policies configured may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM-level privileges, enabling complete system compromise, data theft, persistence establishment, and lateral movement capabilities.

🟠

Likely Case

Local authenticated user elevates to administrative privileges, bypassing security controls to install malware, modify system configurations, or access restricted data.

🟢

If Mitigated

Attack fails due to proper policy restrictions, least privilege implementation, or the system already being patched to version 25.2 or later.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring authenticated access to the system.
🏢 Internal Only: HIGH - Internal users with local accounts can exploit this to gain administrative privileges on affected workstations and servers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated access and knowledge of COM object manipulation techniques. Exploitation depends on specific EPM policy configurations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.2 or later

Vendor Advisory: https://www.beyondtrust.com/trust-center/security-advisories/bt25-01

Restart Required: No

Instructions:

1. Download Privilege Management for Windows version 25.2 or later from BeyondTrust support portal. 2. Run the installer with administrative privileges. 3. Follow the upgrade wizard. 4. Verify the installation completes successfully.

🔧 Temporary Workarounds

Restrict Automatic Privilege Elevation Policies

all

Modify EPM policies to remove or restrict automatic privilege elevation settings for user processes.

Implement Least Privilege Access

all

Ensure users only have necessary privileges and restrict local administrative access.

🧯 If You Can't Patch

  • Review and tighten EPM policies to minimize automatic privilege elevation scenarios
  • Implement application control solutions to restrict COM object manipulation
  • Monitor for suspicious privilege escalation attempts using endpoint detection tools

🔍 How to Verify

Check if Vulnerable:

Check Privilege Management for Windows version in Control Panel > Programs and Features. If version is below 25.2, system is vulnerable.

Check Version:

wmic product where "name like 'Privilege Management for Windows%'" get version

Verify Fix Applied:

Verify version is 25.2 or higher in Control Panel > Programs and Features. Test privilege elevation scenarios that previously worked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events in Windows Security logs
  • EPM policy violation logs showing unexpected COM object access
  • Event ID 4688 with elevated token privileges

Network Indicators:

  • None - this is a local attack

SIEM Query:

EventID=4688 AND (NewProcessName LIKE '%powershell%' OR NewProcessName LIKE '%cmd%') AND TokenElevationType=%%1938

🔗 References

📤 Share & Export