Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution

Posted on July 18, 2025July 18, 2025 By CWS

Three vital vulnerabilities within the Sophos Intercept X for Home windows product household might permit native attackers to realize arbitrary code execution with system-level privileges.

Recognized as CVE-2024-13972, CVE-2025-7433, and CVE-2025-7472, the issues span registry permission misconfigurations, a weak spot within the Machine Encryption element, and a problem within the Home windows installer working beneath the SYSTEM account. 

Key Takeaways1. Three Excessive-severity CVEs allow native privilege escalation in Sophos Intercept X for Home windows.2. Impacts updater, Machine Encryption, and installer parts.3. Improve to the newest patched variations – no workarounds obtainable.

All three defects carry a Excessive severity ranking and have an effect on variations of Intercept X for Home windows earlier than the newest patches launched on July 17, 2025. 

Organizations deploying Sophos Intercept X Endpoint or Intercept X for Server should apply updates instantly or danger unauthorized elevation of privilege and potential full system compromise.

Privilege Escalation & Code Execution Vulnerabilities 

CVE-2024-13972 arises from overly permissive registry ACLs utilized by the Intercept X for Home windows updater, allowing a non-privileged consumer to change vital registry keys throughout an improve and thereby inject code that executes with SYSTEM privileges. 

This native privilege escalation (LPE) vulnerability was responsibly reported by Filip Dragovic of MDSec. 

Within the second challenge, CVE-2025-7433, the Machine Encryption element exposes an elevation of privilege flaw that allows an authenticated native consumer to load and run arbitrary code, bypassing meant encryption safeguards. 

This defect was submitted through WatchTower by researcher Sina Kheirkhah. Lastly, CVE-2025-7472 targets the installer for Intercept X for Home windows.

When the installer runs beneath the SYSTEM context, widespread in enterprise deployments, an area actor can exploit improper file permissions to interchange or manipulate installer information and acquire system-level code execution. 

Sandro Poppi reported this bug by Sophos’s bug bounty program.

CVETitleImpactCVSS 3.1 ScoreSeverityCVE-2024-13972Registry Permissions Vulnerability in Intercept X UpdaterLocal privilege escalation 7.8HIGHCVE-2025-7433Device Encryption Element Privilege EscalationArbitrary code execution with elevated privilegesNot availableHIGHCVE-2025-7472Installer Privilege Escalation VulnerabilityLocal privilege escalation Not availableHIGH

The registry ACL vulnerability CVE-2024-13972 impacts all Intercept X for Home windows installations previous to model 2024.3.2, in addition to Mounted Time period Help (FTS) 2024.3.2.23.2 and Lengthy Time period Help (LTS) 2025.0.1.1.2 releases. 

CVE-2025-7433 applies to the Central Machine Encryption module in Intercept X for Home windows variations earlier than 2025.1. Prospects working FTS or LTS builds additionally require the corresponding builds of 2024.3.2.23.2 or 2025.0.1.1.2 to obtain the repair. 

The installer flaw CVE-2025-7472 impacts any deployment utilizing an installer older than model 1.22 launched on March 6, 2025. 

Organizations counting on default updating insurance policies that robotically set up really helpful packages will obtain patches with out extra motion. In distinction, these on fixed-term or long-term upkeep channels should carry out handbook upgrades.

Mitigations

Sophos has launched up to date packages addressing all three vulnerabilities. Intercept X for Home windows 2024.3.2 and the matched FTS/LTS department variations embrace the CVE-2024-13972 registry repair. 

Machine Encryption 2025.1 and its FTS/LTS counterparts resolve CVE-2025-7433, whereas installer model 1.22, printed March 6, 2025, remediates CVE-2025-7472. 

No interim workarounds can be found, so clients ought to obtain installers immediately from Sophos Central to eradicate outdated copies. 

Enterprises ought to confirm that auto-update insurance policies are enabled for Really helpful packages and that any customized upkeep branches have been upgraded to the mounted releases.

Enhance detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now 

Cyber Security News Tags:Arbitrary, Code, Enable, Execution, Intercept, Sophos, Vulnerabilities, Windows

Post navigation

Previous Post: Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands
Next Post: Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon

Related Posts

FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User Cyber Security News
Ukrainian Networks Launch Massive Brute-Force and Password-Spraying Campaigns Targeting SSL VPN and RDP Systems Cyber Security News
11 Best Cloud Access Security Broker Software (CASB) Cyber Security News
Hackers Allegedly Selling WinRAR 0-day Exploit on Dark Web Forums for $80,000 Cyber Security News
New HTTP Smuggling Attack Technique Let Hackers Inject Malicious Requests Cyber Security News
Allianz Life Insurance Data Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations
  • Cloudflare Confirms Data Breach, Hackers Stole Customer Data from Salesforce Instances
  • How to Use a Secure File Sharing Platform
  • ESPHome Web Server Authentication Bypass Vulnerability Exposes Smart Devices
  • Google Confirms That Claims of Major Gmail Security Warning are False

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations
  • Cloudflare Confirms Data Breach, Hackers Stole Customer Data from Salesforce Instances
  • How to Use a Secure File Sharing Platform
  • ESPHome Web Server Authentication Bypass Vulnerability Exposes Smart Devices
  • Google Confirms That Claims of Major Gmail Security Warning are False

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News