CVE-2025-57624

7.8 HIGH

📋 TL;DR

A DLL hijacking vulnerability in CYRISMA Agent versions before 444 allows local users to escalate privileges and execute arbitrary code by placing malicious DLLs in specific directories. This affects systems running vulnerable versions of CYRISMA Agent, primarily in enterprise environments where the agent is deployed for security monitoring.

💻 Affected Systems

Products:
  • CYRISMA Agent
Versions: All versions before 444
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system. The vulnerability involves multiple DLLs that can be hijacked.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, enabling attackers to install persistent malware, steal sensitive data, or pivot to other systems.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive files, system configuration changes, or installation of additional malicious tools.

🟢

If Mitigated

Limited impact if proper application whitelisting, DLL search path restrictions, and least privilege principles are enforced.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Attackers with initial access to a system (even as low-privilege users) can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is relatively straightforward once initial access is obtained. The YouTube video demonstrates exploitation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 444 or later

Vendor Advisory: https://msry1.gitbook.io/thegoldenrecord/blog/vulnerability-and-bug-disclosures/cyrsma-sensor-version-less-than-2.5

Restart Required: Yes

Instructions:

1. Download CYRISMA Agent version 444 or later from the official vendor source. 2. Uninstall the previous version. 3. Install the updated version. 4. Restart the system to ensure all components are properly loaded.

🔧 Temporary Workarounds

Restrict DLL search paths

windows

Configure Windows to restrict DLL search paths to prevent loading from untrusted directories.

Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager' -Name 'SafeDllSearchMode' -Value 1

Apply application control policies

windows

Use Windows AppLocker or similar application whitelisting to restrict which DLLs can be loaded.

🧯 If You Can't Patch

  • Implement strict least privilege principles - ensure no users have write access to directories where CYRISMA Agent loads DLLs.
  • Monitor for suspicious DLL loading events and file creation in application directories using endpoint detection tools.

🔍 How to Verify

Check if Vulnerable:

Check the CYRISMA Agent version. If it's below 444, the system is vulnerable. Also check for multiple writable directories in the DLL search path.

Check Version:

Check the agent interface or installation directory for version information, or use: wmic product where name='CYRISMA Agent' get version

Verify Fix Applied:

Verify that CYRISMA Agent version is 444 or higher and test that DLL hijacking attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual locations
  • Process creation events for suspicious DLLs in CYRISMA Agent context

Network Indicators:

  • Unusual outbound connections from CYRISMA Agent process after exploitation

SIEM Query:

EventID=7 OR EventID=11 AND ProcessName LIKE '%cyrisma%' AND ImageLoaded CONTAINS suspicious.dll

🔗 References

📤 Share & Export