CVE-2025-60865

7.8 HIGH

📋 TL;DR

A local privilege escalation vulnerability in avanquest Driver Updater allows attackers with local access to gain SYSTEM-level privileges through the Driver Updater Service. This affects users running vulnerable versions of the software on Windows systems. The vulnerability stems from improper access controls in the service component.

💻 Affected Systems

Products:
  • avanquest Driver Updater (PCHelpsoft Driver Updater)
Versions: v9.1.57803.1174 (specific version mentioned), likely earlier versions may also be affected
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Driver Updater Service to be running. Standard installations are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of malware, data theft, persistence mechanisms, and disabling of security controls.

🟠

Likely Case

Local attacker gains administrative privileges to install unwanted software, modify system configurations, or access sensitive data.

🟢

If Mitigated

Limited impact if proper endpoint protection, least privilege principles, and application control are enforced.

🌐 Internet-Facing: LOW - Requires local access to the system, not directly exploitable over network.
🏢 Internal Only: HIGH - Local attackers (including malware or malicious users) can exploit this to escalate privileges on affected systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Proof-of-concept code is publicly available on GitHub. Exploitation requires local access but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.pchelpsoft.com/products/driver-updater/

Restart Required: No

Instructions:

1. Check vendor website for security updates. 2. If update available, download and install. 3. Verify service permissions are corrected. 4. Monitor vendor communications for patch release.

🔧 Temporary Workarounds

Disable Driver Updater Service

windows

Stop and disable the vulnerable service to prevent exploitation

sc stop "Driver Updater Service"
sc config "Driver Updater Service" start= disabled

Remove Software

windows

Uninstall avanquest Driver Updater completely

Control Panel > Programs > Uninstall a program > Select Driver Updater > Uninstall

🧯 If You Can't Patch

  • Implement strict application control policies to prevent unauthorized service execution
  • Enforce least privilege principles and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if Driver Updater Service is running and version matches vulnerable range: Open Services.msc, look for 'Driver Updater Service'

Check Version:

Check program version in Control Panel > Programs or examine installed software registry keys

Verify Fix Applied:

Verify service is stopped/disabled or software is uninstalled. Check service permissions if patched version is installed.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected service starts/stops for Driver Updater Service
  • Privilege escalation attempts in security logs
  • Process creation with SYSTEM privileges from non-admin users

Network Indicators:

  • None - local exploitation only

SIEM Query:

EventID=4688 AND NewProcessName contains 'Driver Updater' AND SubjectUserName != SYSTEM

🔗 References

📤 Share & Export