CVE-2025-14491

7.8 HIGH

📋 TL;DR

This vulnerability in RealDefense SUPERAntiSpyware allows local attackers to escalate privileges from low-privileged user accounts to SYSTEM-level access. Attackers must first gain initial access to execute code on the target system. All installations of SUPERAntiSpyware with the vulnerable SAS Core Service are affected.

💻 Affected Systems

Products:
  • RealDefense SUPERAntiSpyware
Versions: Specific vulnerable versions not specified in advisory - all versions with vulnerable SAS Core Service
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires SUPERAntiSpyware to be installed with SAS Core Service running. The service runs with SYSTEM privileges by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, lateral movement, and data exfiltration.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional malware, and maintain persistence on compromised systems.

🟢

If Mitigated

Limited impact if proper endpoint protection, least privilege principles, and network segmentation are implemented.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring initial access to the system.
🏢 Internal Only: HIGH - Once an attacker gains initial foothold on a system, they can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to execute code. The exposed dangerous function makes exploitation straightforward once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://www.realdefense.com/security-advisory

Restart Required: Yes

Instructions:

1. Check current SUPERAntiSpyware version
2. Visit RealDefense website for security updates
3. Download and install latest version
4. Restart system to ensure service updates apply

🔧 Temporary Workarounds

Disable SUPERAntiSpyware Service

windows

Temporarily disable the SAS Core Service to prevent exploitation

sc stop "SAS Core Service"
sc config "SAS Core Service" start= disabled

Remove Local User Privileges

windows

Implement strict least privilege to limit initial access vectors

🧯 If You Can't Patch

  • Uninstall SUPERAntiSpyware if not essential for security operations
  • Implement application control policies to prevent unauthorized execution of low-privileged code

🔍 How to Verify

Check if Vulnerable:

Check if SUPERAntiSpyware is installed and SAS Core Service is running: sc query "SAS Core Service"

Check Version:

Check program version in Control Panel > Programs and Features or via vendor's update checker

Verify Fix Applied:

Verify SUPERAntiSpyware is updated to latest version and service is restarted

📡 Detection & Monitoring

Log Indicators:

  • Unusual service control operations on SAS Core Service
  • Process creation with SYSTEM privileges from non-admin users
  • Access violations in SUPERAntiSpyware logs

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

Process Creation where Parent Process includes low-privilege user AND New Process includes SYSTEM privileges AND Process Name includes superantispyware components

🔗 References

📤 Share & Export