CVE-2025-41686
📋 TL;DR
This vulnerability allows a low-privileged local attacker to exploit improper permissions on nssm.exe (Non-Sucking Service Manager) to escalate privileges and gain administrative access. It affects systems where nssm.exe is installed with insecure default permissions. Organizations using nssm.exe for service management are at risk.
💻 Affected Systems
- Non-Sucking Service Manager (nssm.exe)
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise where an attacker gains full administrative control, can install malware, steal sensitive data, and pivot to other systems.
Likely Case
Local privilege escalation allowing attackers to bypass security controls, install persistence mechanisms, and access restricted resources.
If Mitigated
Limited impact if proper access controls and monitoring are in place, with attackers unable to exploit the permission misconfiguration.
🎯 Exploit Status
Exploitation requires local access and knowledge of the permission misconfiguration. The attacker needs to be able to execute code on the system with low privileges.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown specific version - check vendor advisory
Vendor Advisory: https://certvde.com/de/advisories/VDE-2025-063
Restart Required: No
Instructions:
1. Check the vendor advisory for patched version. 2. Update nssm.exe to the latest secure version. 3. Verify permissions are properly set after update.
🔧 Temporary Workarounds
Set Proper File Permissions
windowsManually adjust nssm.exe permissions to restrict write access to administrators only
icacls "C:\Path\To\nssm.exe" /inheritance:r
icacls "C:\Path\To\nssm.exe" /grant Administrators:(F)
icacls "C:\Path\To\nssm.exe" /grant SYSTEM:(F)
Remove Unnecessary nssm.exe Installations
windowsRemove nssm.exe from systems where it's not required for operations
del "C:\Path\To\nssm.exe"
🧯 If You Can't Patch
- Implement strict access controls to limit who can execute or modify nssm.exe
- Monitor file integrity of nssm.exe and alert on unauthorized modifications
🔍 How to Verify
Check if Vulnerable:
Check nssm.exe file permissions using: icacls "C:\Path\To\nssm.exe" and verify if low-privileged users have write/modify permissions
Check Version:
nssm.exe version (run from command line) or check file properties
Verify Fix Applied:
Verify nssm.exe permissions only allow SYSTEM and Administrators full control, and check version is updated
📡 Detection & Monitoring
Log Indicators:
- Windows Security Event ID 4663 (File system access) showing unauthorized access to nssm.exe
- Event ID 4688 (Process creation) showing nssm.exe execution from unusual locations
Network Indicators:
- No specific network indicators as this is local privilege escalation
SIEM Query:
source="Windows Security" (EventID=4663 OR EventID=4688) AND (process_name="nssm.exe" OR file_path="*nssm.exe")