Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges

Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges

Posted on May 14, 2025May 14, 2025 By CWS

A newly disclosed safety flaw in Microsoft Defender for Endpoint might enable attackers with native entry to raise their privileges to SYSTEM stage, probably gaining full management over affected techniques. 

The vulnerability, tracked as CVE-2025-26684, was patched as a part of Microsoft’s Could 2025 Patch Tuesday safety updates launched yesterday.

Safety researchers recognized the vulnerability as an “exterior management of filename or path” weak spot in Microsoft Defender for Endpoint that might be exploited by a licensed attacker to raise privileges regionally. 

The vulnerability acquired a CVSS rating of 6.7 out of 10, classifying it as “Essential” severity fairly than “Vital.”

Technical Particulars of CVE-2025-26684

In line with the official Microsoft Safety Response Heart advisory, an attacker who efficiently exploits this vulnerability might achieve SYSTEM privileges, primarily offering them with full management over the compromised system. 

This stage of entry would enable malicious actors to put in applications, modify or delete information, and create accounts with full administrative rights.

“The vulnerability stems from improper validation of user-supplied enter when dealing with file paths in Microsoft Defender for Endpoint,” explains cybersecurity professional Wealthy Mirch from Stratascale, one of many researchers credited with discovering the flaw. 

“When exploited, it permits attackers to control file operations to entry restricted system sources.”

The vulnerability particularly impacts Microsoft Defender for Endpoint for Linux variations previous to 101.25XXX. 

Organizations working this safety resolution ought to guarantee they apply the newest safety replace instantly.

Microsoft has labeled the exploitability evaluation as “Exploitation Unlikely,” indicating that whereas the vulnerability is critical, the corporate believes the probability of widespread exploitation is comparatively low. 

The corporate additionally confirmed that there isn’t a proof that this vulnerability was publicly disclosed or exploited within the wild previous to the patch launch.

The vulnerability was found via coordinated vulnerability disclosure, with credit score given to safety researchers astraleureka and Wealthy Mirch from Stratascale.

Danger FactorsDetailsAffected ProductsMicrosoft Defender for Endpoint (Linux) variations previous to 101.25XXXImpactLocal privilege escalation to SYSTEM-level accessExploit Conditions– Native access- Excessive privileges (approved consumer required)CVSS 3.1 Score6.7 (Essential)

Patch Instantly

This vulnerability was one among 78 safety flaws addressed in Microsoft’s Could 2025 Patch Tuesday.

Safety directors can confirm that the replace has been put in by working the MDE Shopper Analyzer on probably affected units. 

In line with Microsoft’s advisory Report, “When working the analyzer on a Home windows gadget that doesn’t have the safety replace, the analyzer will current a warning (ID 121035) indicating lacking patch and directing to related on-line articles.”

This flaw highlights the continuing significance of promptly making use of safety patches, particularly for safety merchandise which are designed to guard techniques from different threats. 

Whereas Microsoft Defender is supposed to function a defensive instrument, vulnerabilities inside safety merchandise themselves can create vital danger if exploited.

Organizations utilizing Microsoft Defender for Endpoint ought to prioritize putting in the newest safety updates as a part of their common patch administration cycles. 

For environments the place rapid patching isn’t attainable, safety groups ought to implement extra monitoring for suspicious privilege escalation makes an attempt and strange system-level actions that might point out exploitation makes an attempt.

Vulnerability Assault Simulation on How Hackers Quickly Probe Web sites for Entry Factors – Free Webinar

Cyber Security News Tags:Attackers, Defender, Elevate, Microsoft, Privileges, Vulnerability

Post navigation

Previous Post: Google Threat Intelligence Launches Actionable Technique To Hunt for Malicious .Desktop Files
Next Post: Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances

Related Posts

CNCERT Accuses of US Intelligence Agencies Attacking Chinese Military-Industrial Units CNCERT Accuses of US Intelligence Agencies Attacking Chinese Military-Industrial Units Cyber Security News
Water Saci Hackers Leveraging AI Tools to Attack WhatsApp Web Users Water Saci Hackers Leveraging AI Tools to Attack WhatsApp Web Users Cyber Security News
GhostContainer Malware Hacking Exchange Servers in the Wild Using N-day Vulnerability GhostContainer Malware Hacking Exchange Servers in the Wild Using N-day Vulnerability Cyber Security News
Threat Actors Hijack Popular npm Packages to Steal The Project Maintainers’ npm Tokens Threat Actors Hijack Popular npm Packages to Steal The Project Maintainers’ npm Tokens Cyber Security News
Cybersecurity News Recap – Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack Cybersecurity News Recap – Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack Cyber Security News
Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark