CVE-2025-64701

7.8 HIGH

📋 TL;DR

This privilege escalation vulnerability in QND software versions 11.0.9i and earlier allows authenticated Windows users to gain administrator privileges. Attackers could access sensitive information, modify system settings, or perform arbitrary actions. Organizations using affected QND products on Windows systems are at risk.

💻 Affected Systems

Products:
  • QND Premium
  • QND Advance
  • QND Standard
Versions: 11.0.9i and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local user access to the Windows system where QND is installed. The vulnerability exists within the QND software itself.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain domain administrator privileges, exfiltrate all sensitive data, deploy ransomware, and maintain persistent access across the network.

🟠

Likely Case

Local privilege escalation allowing attackers to install malware, steal credentials, access sensitive files, and potentially move laterally to other systems.

🟢

If Mitigated

Limited impact due to strong access controls, network segmentation, and monitoring that detects privilege escalation attempts early.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access to the Windows system. The CWE-268 classification suggests improper privilege management within the application.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 11.0.10 or later

Vendor Advisory: https://www.qualitysoft.com/product/qnd_vulnerabilities_2025/

Restart Required: Yes

Instructions:

1. Download the latest version from QualitySoft's official website. 2. Backup current configuration and data. 3. Run the installer as administrator. 4. Follow installation prompts. 5. Restart the system. 6. Verify the update in QND settings.

🔧 Temporary Workarounds

Restrict QND User Permissions

windows

Limit QND application users to standard user accounts without administrative privileges to reduce attack surface.

Implement Application Control

windows

Use Windows AppLocker or similar to restrict QND's ability to execute privileged operations.

🧯 If You Can't Patch

  • Implement strict least privilege access controls for all QND users
  • Enable detailed auditing and monitoring for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check QND version in the application's About or Help menu. If version is 11.0.9i or earlier, the system is vulnerable.

Check Version:

Check within QND application interface or registry at HKEY_LOCAL_MACHINE\SOFTWARE\QualitySoft\QND\Version

Verify Fix Applied:

Verify QND version is 11.0.10 or later in the application settings and test that standard users cannot perform administrative actions.

📡 Detection & Monitoring

Log Indicators:

  • Windows Security Event ID 4672 (Special privileges assigned to new logon)
  • Unexpected process elevation from QND-related executables
  • Failed privilege escalation attempts in application logs

Network Indicators:

  • Unusual outbound connections from QND processes
  • Lateral movement attempts from QND-hosting systems

SIEM Query:

source="Windows Security" EventID=4672 AND ProcessName="*qnd*" OR source="QND" message="*privilege*" OR "*admin*"

🔗 References

📤 Share & Export