CVE-2025-41686

7.8 HIGH

📋 TL;DR

This vulnerability allows a low-privileged local attacker to exploit improper permissions on nssm.exe (Non-Sucking Service Manager) to escalate privileges and gain administrative access. It affects systems where nssm.exe is installed with insecure default permissions. Organizations using nssm.exe for service management are at risk.

💻 Affected Systems

Products:
  • Non-Sucking Service Manager (nssm.exe)
Versions: All versions prior to patched version (specific version unknown from provided data)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Windows systems where nssm.exe is installed with insecure default permissions allowing low-privileged users to modify or replace the executable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an attacker gains full administrative control, can install malware, steal sensitive data, and pivot to other systems.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install persistence mechanisms, and access restricted resources.

🟢

If Mitigated

Limited impact if proper access controls and monitoring are in place, with attackers unable to exploit the permission misconfiguration.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: HIGH - Internal users with low privileges can exploit this to gain administrative access on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and knowledge of the permission misconfiguration. The attacker needs to be able to execute code on the system with low privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown specific version - check vendor advisory

Vendor Advisory: https://certvde.com/de/advisories/VDE-2025-063

Restart Required: No

Instructions:

1. Check the vendor advisory for patched version. 2. Update nssm.exe to the latest secure version. 3. Verify permissions are properly set after update.

🔧 Temporary Workarounds

Set Proper File Permissions

windows

Manually adjust nssm.exe permissions to restrict write access to administrators only

icacls "C:\Path\To\nssm.exe" /inheritance:r
icacls "C:\Path\To\nssm.exe" /grant Administrators:(F)
icacls "C:\Path\To\nssm.exe" /grant SYSTEM:(F)

Remove Unnecessary nssm.exe Installations

windows

Remove nssm.exe from systems where it's not required for operations

del "C:\Path\To\nssm.exe"

🧯 If You Can't Patch

  • Implement strict access controls to limit who can execute or modify nssm.exe
  • Monitor file integrity of nssm.exe and alert on unauthorized modifications

🔍 How to Verify

Check if Vulnerable:

Check nssm.exe file permissions using: icacls "C:\Path\To\nssm.exe" and verify if low-privileged users have write/modify permissions

Check Version:

nssm.exe version (run from command line) or check file properties

Verify Fix Applied:

Verify nssm.exe permissions only allow SYSTEM and Administrators full control, and check version is updated

📡 Detection & Monitoring

Log Indicators:

  • Windows Security Event ID 4663 (File system access) showing unauthorized access to nssm.exe
  • Event ID 4688 (Process creation) showing nssm.exe execution from unusual locations

Network Indicators:

  • No specific network indicators as this is local privilege escalation

SIEM Query:

source="Windows Security" (EventID=4663 OR EventID=4688) AND (process_name="nssm.exe" OR file_path="*nssm.exe")

🔗 References

📤 Share & Export