CVE-2025-14490

7.8 HIGH

📋 TL;DR

This vulnerability in RealDefense SUPERAntiSpyware allows local attackers who already have low-privileged access to escalate to SYSTEM privileges by exploiting an exposed dangerous function in the SAS Core Service. Affected users are those running vulnerable versions of SUPERAntiSpyware on Windows systems.

💻 Affected Systems

Products:
  • RealDefense SUPERAntiSpyware
Versions: Specific vulnerable versions not specified in advisory, but likely multiple recent versions prior to patching
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access and ability to execute low-privileged code first; the SAS Core Service runs with SYSTEM privileges by default

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM-level code execution, enabling attackers to install persistent malware, steal credentials, disable security controls, and maintain persistent access.

🟠

Likely Case

Local privilege escalation from a standard user account to SYSTEM, allowing attackers to bypass security restrictions, install additional malware, or access protected system resources.

🟢

If Mitigated

Limited impact if proper endpoint protection, least privilege principles, and application control are enforced, though the vulnerability still provides a path for privilege escalation.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to execute code as a low-privileged user first; the exposed dangerous function makes exploitation straightforward once initial access is achieved

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-25-1166/

Restart Required: Yes

Instructions:

1. Check for updates in SUPERAntiSpyware
2. Install the latest version from official RealDefense sources
3. Restart the system to ensure the SAS Core Service is updated

🔧 Temporary Workarounds

Disable or Remove SUPERAntiSpyware

windows

Uninstall or disable the vulnerable software if not essential

Control Panel > Programs > Uninstall a program > Select SUPERAntiSpyware > Uninstall

Restrict Service Permissions

windows

Modify SAS Core Service permissions to prevent low-privileged users from interacting with it

sc.exe sdset SASCoreService D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)

🧯 If You Can't Patch

  • Implement strict application control policies to prevent unauthorized software execution
  • Enforce least privilege principles and segment user accounts to limit lateral movement

🔍 How to Verify

Check if Vulnerable:

Check SUPERAntiSpyware version and compare against vendor's patched version announcement

Check Version:

Check SUPERAntiSpyware About dialog or examine installed programs list

Verify Fix Applied:

Verify the SAS Core Service version has been updated and test privilege escalation attempts fail

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from SAS Core Service
  • Privilege escalation attempts involving SUPERAntiSpyware processes
  • Suspicious service control manager events

Network Indicators:

  • Not applicable - local privilege escalation only

SIEM Query:

Process Creation where Parent Process Name contains 'SAS' OR Service Control Manager events related to 'SAS Core Service'

🔗 References

📤 Share & Export