CVE-2025-59485

3.3 LOW

📋 TL;DR

This vulnerability allows local authenticated users on Windows systems running MaLion Security Point versions before 5.3.4 to place arbitrary files in a specific folder. If a specially crafted DLL is placed there, it could be executed with SYSTEM privileges, leading to privilege escalation.

💻 Affected Systems

Products:
  • MaLion Security Point (Windows client)
Versions: All versions prior to 5.3.4
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows client installations of MaLion Security Point. Requires local authenticated access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local authenticated attacker gains SYSTEM privileges through DLL hijacking, enabling complete system compromise, persistence, and lateral movement.

🟠

Likely Case

Malicious insider or compromised user account escalates privileges to SYSTEM to install malware, steal credentials, or bypass security controls.

🟢

If Mitigated

With proper access controls and monitoring, impact limited to isolated system compromise that can be detected and contained.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring authenticated access to the Windows system.
🏢 Internal Only: MEDIUM - Internal users with local access can exploit this to gain SYSTEM privileges on affected workstations/servers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access and knowledge of the specific vulnerable folder path. DLL planting is a well-known technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.3.4

Vendor Advisory: https://www.intercom.co.jp/information/2025/1125.html

Restart Required: Yes

Instructions:

1. Download MaLion Security Point version 5.3.4 from official vendor sources. 2. Install the update following vendor instructions. 3. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Restrict folder permissions

windows

Modify permissions on the vulnerable folder to prevent unauthorized file creation

icacls "C:\Program Files\MaLion\Security Point\vulnerable_folder" /deny Users:(OI)(CI)W

Enable DLL signature verification

windows

Configure Windows to require signed DLLs where possible

🧯 If You Can't Patch

  • Implement strict least privilege access controls to limit who can log into affected systems
  • Monitor for suspicious file creation in MaLion program directories and DLL loading events

🔍 How to Verify

Check if Vulnerable:

Check MaLion Security Point version in Control Panel > Programs and Features. If version is below 5.3.4, system is vulnerable.

Check Version:

wmic product where name="MaLion Security Point" get version

Verify Fix Applied:

Verify version shows 5.3.4 or higher in Control Panel > Programs and Features. Test that unauthorized users cannot create files in MaLion program directories.

📡 Detection & Monitoring

Log Indicators:

  • File creation events in MaLion program directories by non-SYSTEM users
  • Process creation events showing MaLion loading DLLs from unexpected locations
  • Windows Event ID 4688 with parent process of MaLion services

Network Indicators:

  • Unusual outbound connections from MaLion processes
  • DNS queries for command and control domains from SYSTEM context

SIEM Query:

source="windows_security" event_id=4688 process_name="*malion*" OR parent_process_name="*malion*" | stats count by process_name, parent_process_name, user

🔗 References

📤 Share & Export