Sploit.io - Search

Product: G DATA Management Server, version: < 15.8.333

CVE-2025-0542

Severity: HIGH

Description: Local privilege escalation due to incorrect assignment of privileges of temporary files in the update mechanism of G DATA Management Server. This vulnerability allows a local, unprivileged attacker to escalate privileges on affected installations by placing a crafted ZIP archive in a globally writable directory, which gets unpacked in the context of SYSTEM and results in arbitrary file write.

CVSS Score: 7.8

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.000740000
  • Percentile: 0.222620000
  • Date: 2026-03-13

ExploitDB

No data available.

HackerOne Data

  • Rank: 8899
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • G DATA CyberDefense AG G DATA Management Server - Versions: 0

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability CVE-2025-0542 represents a HIGH risk due to a local privilege escalation vulnerability in the G DATA Management Server. The core issue stems from incorrectly assigned privileges to temporary files during the update mechanism, allowing a local, unprivileged attacker to achieve SYSTEM level access. This vulnerability’s CVSS score of 7.8 reflects the potential for significant impact. The likelihood of exploitation is moderate, as it requires local access to the affected system, but the ease of exploitation is relatively high given the vulnerability lies within a commonly used process (updates) and leverages a crafted ZIP archive. Successful exploitation allows for arbitrary file write capabilities, which impacts confidentiality, integrity, and availability. Confidential data could be stolen, critical system files modified, or the system rendered unavailable. The EPSS score of 0.000740000 indicates a relatively low, but non-negligible, probability of exploitation in the wild.

    2. Potential Attack Scenarios
    An attacker with local access to a G DATA Management Server (e.g., a domain-joined workstation or server) can exploit this vulnerability to gain SYSTEM level privileges. The attack vector begins with identifying a globally writable directory used by the G DATA update mechanism. The attacker then crafts a malicious ZIP archive, carefully designed to exploit the incorrect file permissions during unpacking. This ZIP archive could contain a malicious executable or a script that modifies critical system files. By placing this ZIP archive in the writable directory, the G DATA update process will unpack it in the context of the SYSTEM account. This allows the attacker's malicious code to execute with SYSTEM privileges, granting them full control over the affected system. The potential outcome includes installing malware, stealing sensitive data, or modifying system configurations to facilitate further compromise.

    3. Mitigation Recommendations
    The primary mitigation recommendation is to upgrade the G DATA Management Server to version 15.8.333 or later. This update addresses the incorrect privilege assignment issue. In the interim, while patching, monitor globally writable directories used by the G DATA Management Server for unexpected ZIP archive files. Implement principle of least privilege where possible, further limiting access to these writable directories. Review file system permissions to ensure temporary files are created with appropriate, restrictive permissions. Refer to the GitHub security advisory for more details: https://github.com/nullby73/security-advisories/tree/main/CVE-2025-0542. Regular vulnerability scanning should also be employed to identify and address similar vulnerabilities.

    4. Executive Summary
    CVE-2025-0542 is a HIGH risk vulnerability affecting the G DATA Management Server. It allows a local attacker to escalate their privileges to SYSTEM level, potentially compromising the confidentiality, integrity, and availability of the affected system. A malicious actor could steal sensitive data, install malware, or disrupt business operations. The vulnerability is triggered by a flawed update mechanism that doesn’t properly manage file permissions when unpacking ZIP archives. To mitigate this risk, organizations should immediately upgrade their G DATA Management Server to version 15.8.333 or later. This update is crucial to prevent potential compromise and maintain the security of the affected systems. Addressing this vulnerability is a priority to minimize the potential business impact and ensure continued operational stability.