Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Salesforce CLI Installer Vulnerability Let Attackers Execute Code and Gain SYSTEM-Level Access

Posted on September 24, 2025September 24, 2025 By CWS

A essential vulnerability within the Salesforce CLI installer (sf-x64.exe) allows attackers to realize arbitrary code execution, privilege escalation, and SYSTEM-level entry on Home windows methods. 

Tracked as CVE-2025-9844, the flaw stems from improper dealing with of executable file paths by the installer, permitting malicious information to be executed instead of official binaries when the software program is obtained from untrusted sources.

Path Hijacking Vulnerability (CVE-2025-9844)

The vulnerability exploits how the Salesforce-CLI installer resolves file paths throughout set up. When sf-x64.exe runs, it masses a number of auxiliary executables and DLLs from the present working listing earlier than falling again to the listing containing the installer. 

An attacker who locations a crafted executable named identically to a official part (for instance, sf-autoupdate.exe or sf-config.dll) in the identical folder may cause the installer to load and execute the attacker’s code. 

As a result of the installer runs with elevated privileges by default, writing registry keys underneath HKLM and creating providers underneath LocalSystem, the injected code inherits SYSTEM-level privileges, enabling full takeover of the host machine.

Upon execution, the installer masses the rogue sf-autoupdate.exe, which escalates privileges by making a reverse shell service underneath the LocalSystem account. The attacker then makes use of the shell to execute instructions and efficiently retrieves SYSTEM-level output.

Threat FactorsDetailsAffected ProductsSalesforce CLI installer (sf-x64.exe) variations ImpactArbitrary code execution; privilege escalation to SYSTEM-level accessExploit PrerequisitesInstaller obtained from untrusted supply; attacker locations malicious executable in installer’s working listing; installer run with elevated privilegesCVSS 3.1 Score7.8 (Excessive)

Affected Variations and Mitigation

All Salesforce-CLI variations previous to 2.106.6 are impacted by this path hijacking vulnerability. 

Importantly, solely customers who set up the CLI from untrusted mirrors or third-party repositories are in danger; installations instantly downloaded by way of the official Salesforce website use a signed installer that enforces strict path decision and integrity checks.

To remediate, affected customers ought to instantly uninstall any CLI model obtained from unverified sources and carry out an intensive system scan for unknown executables or suspicious providers. 

Salesforce has launched model 2.106.6, which fixes the difficulty by hard-coding absolute file paths and validating digital signatures earlier than loading supplementary executables. 

Directors are suggested to implement set up from trusted endpoints solely and to allow Microsoft Defender Software Management (MDAC) insurance policies to limit execution of unauthorized binaries in set up directories. 

Steady monitoring of system occasion logs for sudden service creation or installer execution underneath non-standard paths will assist detect tried exploits early.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Access, Attackers, CLI, Code, Execute, Gain, Installer, Salesforce, SYSTEMLevel, Vulnerability

Post navigation

Previous Post: GitHub Boosting Security in Response to NPM Supply Chain Attacks 
Next Post: OnePlus OxygenOS Vulnerability Allows Any App to Read SMS Data Without Permission

Related Posts

Global Jewellery Brand Pandora Suffers Hacked Cyber Security News
New Blitz Malware Attacking Windows Servers to Deploy Monero Miner Cyber Security News
17K+ SharePoint Servers Exposed to Internet Cyber Security News
20 Best Endpoint Management Tools Cyber Security News
Hackers Exploiting Libraesva Email Security Gateway Vulnerability to Inject Malicious Commands Cyber Security News
Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News