CVE-2025-27812

8.1 HIGH

📋 TL;DR

MSI Center versions before 2.0.52.0 contain a Time-of-Check Time-of-Use (TOCTOU) vulnerability that allows local attackers to escalate privileges. This affects users running vulnerable versions of MSI Center software on Windows systems. Attackers could gain elevated system privileges by exploiting race conditions in file operations.

💻 Affected Systems

Products:
  • MSI Center
Versions: All versions before 2.0.52.0
Operating Systems: Windows 10, Windows 11
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with MSI Center installed; typically gaming/workstation systems from MSI. Requires local user access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM/administrator privileges, enabling complete system compromise, data theft, malware persistence, and lateral movement.

🟠

Likely Case

Local user or malware with limited privileges escalates to administrator rights to install additional malware, modify system settings, or bypass security controls.

🟢

If Mitigated

With proper patching and least privilege principles, impact is limited to local system only with no network propagation.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access; not directly exploitable over network.
🏢 Internal Only: HIGH - Any compromised user account or malware with local execution can exploit this to gain full system control on affected endpoints.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

TOCTOU vulnerabilities require precise timing but are well-understood attack patterns. Requires local execution on target system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.52.0 or later

Vendor Advisory: https://csr.msi.com/global/product-security-advisories

Restart Required: Yes

Instructions:

1. Open MSI Center application. 2. Check for updates in settings. 3. Install version 2.0.52.0 or newer. 4. Restart system if prompted.

🔧 Temporary Workarounds

Uninstall MSI Center

windows

Remove vulnerable software entirely if not required

Control Panel > Programs > Uninstall a program > Select MSI Center > Uninstall

Restrict local user privileges

windows

Apply least privilege principle to limit potential damage

🧯 If You Can't Patch

  • Remove local user access to affected systems where possible
  • Implement application whitelisting to prevent unauthorized execution

🔍 How to Verify

Check if Vulnerable:

Check MSI Center version in application settings or Control Panel > Programs

Check Version:

wmic product where name="MSI Center" get version

Verify Fix Applied:

Confirm MSI Center version is 2.0.52.0 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events in Windows Security logs
  • MSI Center process spawning with elevated privileges

Network Indicators:

  • No direct network indicators - local exploitation only

SIEM Query:

EventID=4688 AND ProcessName="*MSI*" AND NewProcessName contains "cmd.exe" OR "powershell.exe"

🔗 References

📤 Share & Export