CVE-2025-7073

7.8 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Bitdefender Total Security where low-privileged attackers can delete arbitrary files via a symbolic link attack, then chain this with file copy operations and DLL injection to achieve SYSTEM-level code execution. It affects Windows systems running the vulnerable Bitdefender version. Attackers need local access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Bitdefender Total Security
Versions: 27.0.46.231
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Windows OS with Bitdefender installed. The vulnerable component bdservicehost.exe runs with SYSTEM privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM-level compromise allowing attackers to install persistent malware, steal credentials, disable security controls, and pivot to other systems on the network.

🟠

Likely Case

Local privilege escalation to SYSTEM privileges enabling installation of backdoors, credential dumping, and lateral movement within the network.

🟢

If Mitigated

Limited to low-privileged user capabilities if proper access controls prevent local user access or if the vulnerability is patched.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring attacker to have local access to the system.
🏢 Internal Only: HIGH - Malicious insiders or attackers who gain initial foothold can use this to escalate privileges and move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and involves multiple steps: symbolic link creation, file deletion, file copy chaining, and DLL injection. The vulnerability details are publicly disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version (check Bitdefender for specific fixed version)

Vendor Advisory: https://www.bitdefender.com/support/security-advisories/local-privilege-escalation-via-arbitrary-file-operation-in-bitdefender-atc-va-12590

Restart Required: Yes

Instructions:

1. Open Bitdefender interface 2. Check for updates 3. Install available updates 4. Restart computer 5. Verify update completed successfully

🔧 Temporary Workarounds

Restrict access to vulnerable directory

windows

Set restrictive permissions on C:\ProgramData\Atc\Feedback to prevent low-privileged users from writing to it

icacls "C:\ProgramData\Atc\Feedback" /inheritance:r
icacls "C:\ProgramData\Atc\Feedback" /grant SYSTEM:F
icacls "C:\ProgramData\Atc\Feedback" /grant Administrators:F

Monitor symbolic link creation

windows

Enable auditing for symbolic link creation in vulnerable directories

auditpol /set /subcategory:"File System" /success:enable /failure:enable

🧯 If You Can't Patch

  • Implement strict access controls to prevent low-privileged users from accessing systems with Bitdefender
  • Monitor for suspicious file operations in C:\ProgramData\Atc\Feedback directory and DLL injection attempts

🔍 How to Verify

Check if Vulnerable:

Check Bitdefender version in the application interface or via 'wmic product where name="Bitdefender Total Security" get version'

Check Version:

wmic product where name="Bitdefender Total Security" get version

Verify Fix Applied:

Verify Bitdefender version is newer than 27.0.46.231 and check that C:\ProgramData\Atc\Feedback directory has proper permissions

📡 Detection & Monitoring

Log Indicators:

  • File deletion events in C:\ProgramData\Atc\Feedback by bdservicehost.exe
  • Symbolic link creation in vulnerable directories
  • DLL injection attempts into SYSTEM processes

Network Indicators:

  • Unusual outbound connections from SYSTEM processes post-exploitation

SIEM Query:

process_name="bdservicehost.exe" AND file_path="C:\\ProgramData\\Atc\\Feedback\\*" AND action="delete"

🔗 References

📤 Share & Export