Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Salesforce CLI Installer Vulnerability Let Attackers Execute Code and Gain SYSTEM-Level Access

Salesforce CLI Installer Vulnerability Let Attackers Execute Code and Gain SYSTEM-Level Access

Posted on September 24, 2025September 24, 2025 By CWS

A essential vulnerability within the Salesforce CLI installer (sf-x64.exe) allows attackers to realize arbitrary code execution, privilege escalation, and SYSTEM-level entry on Home windows methods. 

Tracked as CVE-2025-9844, the flaw stems from improper dealing with of executable file paths by the installer, permitting malicious information to be executed instead of official binaries when the software program is obtained from untrusted sources.

Path Hijacking Vulnerability (CVE-2025-9844)

The vulnerability exploits how the Salesforce-CLI installer resolves file paths throughout set up. When sf-x64.exe runs, it masses a number of auxiliary executables and DLLs from the present working listing earlier than falling again to the listing containing the installer. 

An attacker who locations a crafted executable named identically to a official part (for instance, sf-autoupdate.exe or sf-config.dll) in the identical folder may cause the installer to load and execute the attacker’s code. 

As a result of the installer runs with elevated privileges by default, writing registry keys underneath HKLM and creating providers underneath LocalSystem, the injected code inherits SYSTEM-level privileges, enabling full takeover of the host machine.

Upon execution, the installer masses the rogue sf-autoupdate.exe, which escalates privileges by making a reverse shell service underneath the LocalSystem account. The attacker then makes use of the shell to execute instructions and efficiently retrieves SYSTEM-level output.

Threat FactorsDetailsAffected ProductsSalesforce CLI installer (sf-x64.exe) variations ImpactArbitrary code execution; privilege escalation to SYSTEM-level accessExploit PrerequisitesInstaller obtained from untrusted supply; attacker locations malicious executable in installer’s working listing; installer run with elevated privilegesCVSS 3.1 Score7.8 (Excessive)

Affected Variations and Mitigation

All Salesforce-CLI variations previous to 2.106.6 are impacted by this path hijacking vulnerability. 

Importantly, solely customers who set up the CLI from untrusted mirrors or third-party repositories are in danger; installations instantly downloaded by way of the official Salesforce website use a signed installer that enforces strict path decision and integrity checks.

To remediate, affected customers ought to instantly uninstall any CLI model obtained from unverified sources and carry out an intensive system scan for unknown executables or suspicious providers. 

Salesforce has launched model 2.106.6, which fixes the difficulty by hard-coding absolute file paths and validating digital signatures earlier than loading supplementary executables. 

Directors are suggested to implement set up from trusted endpoints solely and to allow Microsoft Defender Software Management (MDAC) insurance policies to limit execution of unauthorized binaries in set up directories. 

Steady monitoring of system occasion logs for sudden service creation or installer execution underneath non-standard paths will assist detect tried exploits early.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Access, Attackers, CLI, Code, Execute, Gain, Installer, Salesforce, SYSTEMLevel, Vulnerability

Post navigation

Previous Post: GitHub Boosting Security in Response to NPM Supply Chain Attacks 
Next Post: OnePlus OxygenOS Vulnerability Allows Any App to Read SMS Data Without Permission

Related Posts

Chinese Hackers Using Custom ShadowPad IIS Listener Module to Turn Compromised Servers into Active Nodes Chinese Hackers Using Custom ShadowPad IIS Listener Module to Turn Compromised Servers into Active Nodes Cyber Security News
Microsoft Scripting Engine 0-Day Vulnerability Enables Remote Code Execution Over Network Microsoft Scripting Engine 0-Day Vulnerability Enables Remote Code Execution Over Network Cyber Security News
25 Controls, Mapped And Audit-Ready 25 Controls, Mapped And Audit-Ready Cyber Security News
DeepSeek-R1 Makes Code for Prompts With Severe Security Vulnerabilities DeepSeek-R1 Makes Code for Prompts With Severe Security Vulnerabilities Cyber Security News
Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed Cyber Security News
XLoader Malware Analyzed Using ChatGPT’s, Breaks RC4 Encryption Layers in Hours XLoader Malware Analyzed Using ChatGPT’s, Breaks RC4 Encryption Layers in Hours Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News