CVE-2025-6250

Prior to 25.4.270.0, when wmic.exe is elevated with a full admin token the user can stop the Defendpoint service, bypassing anti-tamper protections. Once the service is disabled, the malicious user can add themselves to Administrators group and run any process with elevated permissions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:beyondtrust:privilege_management_for_windows:*:*:*:*:*:*:*:*

History

04 Aug 2025, 13:45

Type Values Removed Values Added
First Time Beyondtrust privilege Management For Windows
Beyondtrust
References () https://www.beyondtrust.com/trust-center/security-advisories/bt25-06 - () https://www.beyondtrust.com/trust-center/security-advisories/bt25-06 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.7
CPE cpe:2.3:a:beyondtrust:privilege_management_for_windows:*:*:*:*:*:*:*:*

29 Jul 2025, 14:14

Type Values Removed Values Added
Summary
  • (es) Antes de la versión 25.4.270.0, al elevar wmic.exe con un token de administrador completo, el usuario podía detener el servicio Defendpoint, omitiendo así las protecciones antimanipulación. Una vez deshabilitado el servicio, el usuario malintencionado podía agregarse al grupo de administradores y ejecutar cualquier proceso con permisos elevados.

28 Jul 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-28 16:15

Updated : 2025-08-04 13:45


NVD link : CVE-2025-6250

Mitre link : CVE-2025-6250

CVE.ORG link : CVE-2025-6250


JSON object : View

Products Affected

beyondtrust

  • privilege_management_for_windows
CWE
CWE-424

Improper Protection of Alternate Path