CVE-2025-14493

7.8 HIGH

📋 TL;DR

This vulnerability in RealDefense SUPERAntiSpyware allows local attackers to escalate privileges from low-privileged user accounts to SYSTEM-level access. Attackers must first gain execution capability on the target system, then exploit an exposed dangerous function in the SAS Core Service. All installations of the affected software are vulnerable.

💻 Affected Systems

Products:
  • RealDefense SUPERAntiSpyware
Versions: Specific versions not disclosed in advisory, but all versions with vulnerable SAS Core Service component
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires SUPERAntiSpyware to be installed and running with SAS Core Service active

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, lateral movement, and data exfiltration.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional malware, and maintain persistence on compromised systems.

🟢

If Mitigated

Limited impact if proper endpoint protection, least privilege principles, and network segmentation are implemented.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring initial access to the system.
🏢 Internal Only: HIGH - Once an attacker gains initial foothold on a system, they can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to execute code. ZDI has confirmed the vulnerability and exploitation appears straightforward once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://www.realdefense.com/security-advisories

Restart Required: Yes

Instructions:

1. Check current SUPERAntiSpyware version
2. Visit RealDefense website for latest updates
3. Download and install the latest version
4. Restart system to ensure service updates apply

🔧 Temporary Workarounds

Disable SUPERAntiSpyware Service

windows

Temporarily disable the SAS Core Service to prevent exploitation

sc stop "SAS Core Service"
sc config "SAS Core Service" start= disabled

Remove Local User Privileges

windows

Implement strict least privilege to limit initial attack surface

🧯 If You Can't Patch

  • Uninstall SUPERAntiSpyware if not essential
  • Implement application control to block unauthorized execution

🔍 How to Verify

Check if Vulnerable:

Check if SUPERAntiSpyware is installed and SAS Core Service is running via 'sc query "SAS Core Service"'

Check Version:

Check program version in Control Panel > Programs and Features or via SUPERAntiSpyware interface

Verify Fix Applied:

Verify installed version matches or exceeds patched version from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual service control operations on SAS Core Service
  • Process creation with SYSTEM privileges from non-admin accounts
  • Suspicious DLL loading in SUPERAntiSpyware processes

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

EventID=4688 AND NewProcessName LIKE '%SYSTEM%' AND SubjectUserName NOT IN ('SYSTEM', 'LOCAL SERVICE', 'NETWORK SERVICE')

🔗 References

📤 Share & Export