CVE-2025-7472

7.5 HIGH

📋 TL;DR

A local privilege escalation vulnerability in Sophos Intercept X for Windows installer allows local users to gain SYSTEM-level privileges when the installer runs with elevated permissions. This affects organizations using vulnerable versions of Sophos Intercept X for Windows. Attackers with local access can exploit this to gain complete control of affected systems.

💻 Affected Systems

Products:
  • Sophos Intercept X for Windows
Versions: Versions prior to 1.22
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only exploitable when the installer runs as SYSTEM, which typically occurs during installation, updates, or maintenance operations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access gains SYSTEM privileges, enabling complete system compromise, persistence installation, credential theft, and lateral movement across the network.

🟠

Likely Case

Malicious insiders or attackers who have gained initial foothold escalate privileges to SYSTEM, allowing them to disable security controls, install malware, or access sensitive data.

🟢

If Mitigated

With proper access controls and least privilege principles, the attack surface is reduced, though the vulnerability still exists in vulnerable software versions.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access; not directly exploitable over the internet.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain SYSTEM privileges on vulnerable endpoints.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and the installer to run as SYSTEM. The CWE-427 (Uncontrolled Search Path Element) suggests path manipulation may be involved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.22 or later

Vendor Advisory: https://www.sophos.com/en-us/security-advisories/sophos-sa-20250717-cix-lpe

Restart Required: Yes

Instructions:

1. Download Sophos Intercept X for Windows version 1.22 or later from Sophos Central or vendor portal. 2. Run the installer with administrative privileges. 3. Follow on-screen installation prompts. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Restrict installer execution

windows

Prevent unauthorized users from running the Sophos Intercept X installer with elevated privileges.

Use Group Policy or endpoint protection to restrict execution of Sophos installer files by non-administrative users

Implement least privilege

windows

Ensure users operate with minimal necessary privileges to reduce attack surface.

Configure User Account Control (UAC) to highest setting
Use standard user accounts for daily operations

🧯 If You Can't Patch

  • Monitor for unauthorized attempts to run Sophos installer with elevated privileges using endpoint detection tools.
  • Segment networks to limit lateral movement in case of successful privilege escalation.

🔍 How to Verify

Check if Vulnerable:

Check Sophos Intercept X version in Windows Programs and Features or via Sophos Central dashboard. Versions prior to 1.22 are vulnerable.

Check Version:

wmic product where "name like 'Sophos Intercept X%'" get version

Verify Fix Applied:

Confirm Sophos Intercept X version is 1.22 or later in Programs and Features or Sophos Central. Verify no unauthorized privilege escalation attempts in security logs.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing Sophos installer running as SYSTEM by non-administrative users
  • UAC elevation prompts for Sophos installer from unexpected users

Network Indicators:

  • Unusual outbound connections from systems after Sophos installer execution

SIEM Query:

source="Windows Security" AND event_id=4688 AND process_name="*Sophos*" AND user_name!="SYSTEM" AND integrity_level="High"

🔗 References

📤 Share & Export