CVE-2025-14494

7.8 HIGH

📋 TL;DR

This vulnerability in RealDefense SUPERAntiSpyware allows local attackers to escalate privileges from low-privileged user accounts to SYSTEM level. Attackers must first gain initial access to execute code on the target system. All installations of the affected software are vulnerable.

💻 Affected Systems

Products:
  • RealDefense SUPERAntiSpyware
Versions: Specific versions not disclosed in advisory, but all versions with vulnerable SAS Core Service
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the SAS Core Service component. Requires local access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation leading to persistence mechanisms, credential dumping, and installation of additional malicious tools.

🟢

If Mitigated

Limited impact if proper endpoint protection, least privilege principles, and network segmentation are in place.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to execute low-privileged code first. The exposed dangerous function makes exploitation straightforward once initial access is achieved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-25-1163/

Restart Required: Yes

Instructions:

1. Check for updates in SUPERAntiSpyware. 2. Install the latest version. 3. Restart the system to ensure the SAS Core Service is updated.

🔧 Temporary Workarounds

Remove SUPERAntiSpyware

windows

Uninstall the vulnerable software if not required

Control Panel > Programs > Uninstall a program > Select SUPERAntiSpyware > Uninstall

Restrict Service Permissions

windows

Limit who can interact with the SAS Core Service

sc.exe sdset "SAS Core Service" D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)

🧯 If You Can't Patch

  • Implement strict least privilege principles to limit local user access
  • Deploy endpoint detection and response (EDR) to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check SUPERAntiSpyware version and verify if SAS Core Service is running. Vulnerable if using affected versions.

Check Version:

Check SUPERAntiSpyware About dialog or examine program files version information

Verify Fix Applied:

Verify SUPERAntiSpyware is updated to latest version and restart system. Check that SAS Core Service is running updated version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from SUPERAntiSpyware directories
  • SAS Core Service spawning unexpected child processes
  • Privilege escalation events in Windows Security logs

Network Indicators:

  • None - local exploitation only

SIEM Query:

Process Creation where (Image contains 'SUPERAntiSpyware' OR ParentImage contains 'SUPERAntiSpyware') AND IntegrityLevel changed

🔗 References

📤 Share & Export