CVE-2025-57846

7.8 HIGH

📋 TL;DR

Multiple i-フィルター products have incorrect default permissions that allow local authenticated attackers to replace service executables. This could lead to arbitrary code execution with SYSTEM privileges on affected systems. Organizations using these products are at risk.

💻 Affected Systems

Products:
  • i-フィルター products (specific models not detailed in provided references)
Versions: Not specified in provided references
Operating Systems: Windows (implied by SYSTEM privileges)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installations; requires local authenticated access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full SYSTEM-level control over the system, enabling complete compromise, data theft, and lateral movement within the network.

🟠

Likely Case

Privilege escalation from a standard user account to SYSTEM, allowing installation of malware, persistence mechanisms, or credential harvesting.

🟢

If Mitigated

Limited impact if proper access controls and monitoring prevent unauthorized local access to affected systems.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access; replacing executables with SYSTEM privileges is straightforward once permissions are bypassed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references

Vendor Advisory: https://www.daj.jp/shared/php/downloadset/c/parts.php?page=dl&filename=information_20250827_01.pdf

Restart Required: Yes

Instructions:

1. Review vendor advisory at provided URL. 2. Download and apply the latest patch from the vendor. 3. Restart affected systems to ensure changes take effect.

🔧 Temporary Workarounds

Restrict Local Access

windows

Limit local user access to systems running i-フィルター to trusted administrators only.

Harden File Permissions

windows

Manually adjust permissions on i-フィルター service executables to prevent unauthorized writes.

icacls "C:\Path\To\iFilterService.exe" /deny Users:(W)

🧯 If You Can't Patch

  • Implement strict access controls to limit local user accounts on affected systems.
  • Monitor for unauthorized file modifications to i-フィルター executables using file integrity monitoring tools.

🔍 How to Verify

Check if Vulnerable:

Check if i-フィルター is installed and review file permissions on its service executables for overly permissive write access.

Check Version:

Not specified; check vendor documentation for version query commands.

Verify Fix Applied:

Verify that patches have been applied by checking the product version against the vendor's fixed version list and confirming file permissions are properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected modifications to i-フィルター executable files in Windows event logs or file access logs.
  • Service restarts or failures related to i-フィルター services.

Network Indicators:

  • Unusual outbound connections from systems running i-フィルター, potentially indicating command and control activity.

SIEM Query:

EventID=4663 AND ObjectName LIKE '%i-フィルター%' AND Accesses LIKE '%Write%'

🔗 References

📤 Share & Export