Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Salesforce CLI Installer Vulnerability Let Attackers Execute Code and Gain SYSTEM-Level Access

Posted on September 24, 2025September 24, 2025 By CWS

A essential vulnerability within the Salesforce CLI installer (sf-x64.exe) allows attackers to realize arbitrary code execution, privilege escalation, and SYSTEM-level entry on Home windows methods. 

Tracked as CVE-2025-9844, the flaw stems from improper dealing with of executable file paths by the installer, permitting malicious information to be executed instead of official binaries when the software program is obtained from untrusted sources.

Path Hijacking Vulnerability (CVE-2025-9844)

The vulnerability exploits how the Salesforce-CLI installer resolves file paths throughout set up. When sf-x64.exe runs, it masses a number of auxiliary executables and DLLs from the present working listing earlier than falling again to the listing containing the installer. 

An attacker who locations a crafted executable named identically to a official part (for instance, sf-autoupdate.exe or sf-config.dll) in the identical folder may cause the installer to load and execute the attacker’s code. 

As a result of the installer runs with elevated privileges by default, writing registry keys underneath HKLM and creating providers underneath LocalSystem, the injected code inherits SYSTEM-level privileges, enabling full takeover of the host machine.

Upon execution, the installer masses the rogue sf-autoupdate.exe, which escalates privileges by making a reverse shell service underneath the LocalSystem account. The attacker then makes use of the shell to execute instructions and efficiently retrieves SYSTEM-level output.

Threat FactorsDetailsAffected ProductsSalesforce CLI installer (sf-x64.exe) variations ImpactArbitrary code execution; privilege escalation to SYSTEM-level accessExploit PrerequisitesInstaller obtained from untrusted supply; attacker locations malicious executable in installer’s working listing; installer run with elevated privilegesCVSS 3.1 Score7.8 (Excessive)

Affected Variations and Mitigation

All Salesforce-CLI variations previous to 2.106.6 are impacted by this path hijacking vulnerability. 

Importantly, solely customers who set up the CLI from untrusted mirrors or third-party repositories are in danger; installations instantly downloaded by way of the official Salesforce website use a signed installer that enforces strict path decision and integrity checks.

To remediate, affected customers ought to instantly uninstall any CLI model obtained from unverified sources and carry out an intensive system scan for unknown executables or suspicious providers. 

Salesforce has launched model 2.106.6, which fixes the difficulty by hard-coding absolute file paths and validating digital signatures earlier than loading supplementary executables. 

Directors are suggested to implement set up from trusted endpoints solely and to allow Microsoft Defender Software Management (MDAC) insurance policies to limit execution of unauthorized binaries in set up directories. 

Steady monitoring of system occasion logs for sudden service creation or installer execution underneath non-standard paths will assist detect tried exploits early.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Access, Attackers, CLI, Code, Execute, Gain, Installer, Salesforce, SYSTEMLevel, Vulnerability

Post navigation

Previous Post: GitHub Boosting Security in Response to NPM Supply Chain Attacks 
Next Post: OnePlus OxygenOS Vulnerability Allows Any App to Read SMS Data Without Permission

Related Posts

Microsoft Outlook for Windows Bug Leads to Crash While Opening Email Cyber Security News
Top 10 Advanced Threat Detection Techniques for Modern Cybersecurity Cyber Security News
Zabbix Agent and Agent 2 for Windows Vulnerability Let Attackers Escalate Privileges Cyber Security News
Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials Cyber Security News
Chess.com Data Breach – Hackers Breached External Systems and Gained Internal Access Cyber Security News
First-Ever Malicious MCP Server Found in the Wild Steals Emails via AI Agents Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark