CVE-2025-23385

7.8 HIGH

📋 TL;DR

This vulnerability allows local privilege escalation via the ETW Host Service in JetBrains development tools. Attackers with initial access to a system could elevate privileges to gain higher-level permissions. Users of affected JetBrains products on Windows systems are at risk.

💻 Affected Systems

Products:
  • JetBrains ReSharper
  • JetBrains Rider
  • JetBrains dotTrace
  • ETW Host Service
Versions: ReSharper before 2024.3.4, 2024.2.8, and 2024.1.7; Rider before 2024.3.4, 2024.2.8, and 2024.1.7; dotTrace before 2024.3.4, 2024.2.8, and 2024.1.7; ETW Host Service before 16.43
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Windows ETW Host Service component and affected JetBrains products installed. The vulnerability is in the interaction between these components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could gain SYSTEM/administrator privileges, enabling complete system compromise, data theft, and persistence establishment.

🟠

Likely Case

Malicious users or malware with initial foothold could escalate privileges to bypass security controls and install additional payloads.

🟢

If Mitigated

With proper privilege separation and endpoint protection, exploitation attempts would be detected or blocked, limiting impact to isolated processes.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring initial access to the system.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts could exploit this to gain elevated privileges within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of the vulnerability. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ReSharper 2024.3.4/2024.2.8/2024.1.7; Rider 2024.3.4/2024.2.8/2024.1.7; dotTrace 2024.3.4/2024.2.8/2024.1.7; ETW Host Service 16.43

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: No

Instructions:

1. Open affected JetBrains IDE. 2. Navigate to Help > Check for Updates. 3. Install available updates. 4. For ETW Host Service, update through JetBrains Toolbox or download from vendor site.

🔧 Temporary Workarounds

Disable ETW Host Service

Windows

Temporarily disable the vulnerable ETW Host Service component

sc stop "JetBrains ETW Host Service"
sc config "JetBrains ETW Host Service" start= disabled

Restrict Service Permissions

Windows

Modify service permissions to prevent unauthorized access

sc sdset "JetBrains ETW Host Service" D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)

🧯 If You Can't Patch

  • Implement strict endpoint privilege management to limit local user rights
  • Deploy application control policies to restrict execution of unauthorized processes

🔍 How to Verify

Check if Vulnerable:

Check installed versions of JetBrains products and ETW Host Service against affected versions list

Check Version:

For ReSharper/Rider/dotTrace: Check About dialog in IDE. For ETW Host Service: sc qc "JetBrains ETW Host Service"

Verify Fix Applied:

Verify product versions show patched versions and ETW Host Service version is 16.43 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unexpected service starts/stops of JetBrains ETW Host Service
  • Privilege escalation attempts in Windows Security logs
  • Unusual process creation from JetBrains components

Network Indicators:

  • Local service communication anomalies

SIEM Query:

EventID=4688 AND (NewProcessName LIKE '%JetBrains%' OR ParentProcessName LIKE '%JetBrains%') AND IntegrityLevelChanged

🔗 References

📤 Share & Export