Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SolarWinds Dameware Remote Control Service Vulnerability Allows Privilege Escalation

SolarWinds Dameware Remote Control Service Vulnerability Allows Privilege Escalation

Posted on June 3, 2025June 3, 2025 By CWS

A big vulnerability, CVE-2025-26396, impacts the SolarWinds Dameware Mini Distant Management Service might enable attackers to escalate privileges on affected techniques.

Safety researcher Alexander Pudwill, working with Development Micro Zero Day Initiative, responsibly disclosed the flaw to SolarWinds.

In a coordinated vulnerability disclosure, SolarWinds has launched Dameware model 12.3.2, which addresses a vital safety vulnerability.

LPE Vulnerability in Dameware Mini Distant Management

The CVE-2025-26396 vulnerability stems from incorrect permissions configuration inside the Dameware Mini Distant Management Service, creating a chance for native privilege escalation assaults. 

This Incorrect Permissions Native Privilege Escalation Vulnerability particularly targets the service’s permission construction, permitting malicious actors to raise their entry rights past meant boundaries.

The vulnerability requires particular circumstances to be exploited efficiently. Attackers will need to have native entry to the goal system and possess a sound low privilege account. 

This constraint implies that distant exploitation will not be doable with out prior system compromise, considerably limiting the assault floor. 

Nonetheless, the excessive severity score displays the numerous affect potential as soon as these conditions are met.

The technical nature of this vulnerability entails improper entry controls inside the Dameware service structure. 

When a low-privileged consumer interacts with the service, the wrong permissions enable for unauthorized elevation to greater privilege ranges, doubtlessly granting administrative entry to system assets and delicate information.

Threat FactorsDetailsAffected ProductsSolarWinds Dameware Mini Distant Management Service variations previous to 12.3.2ImpactLocal Privilege Escalation by way of Incorrect Permissions ConfigurationExploit Prerequisites1. Native system access2. Legitimate low-privilege consumer accountCVSS 3.1 Score7.8 (Excessive)

Technical Affect and Remediation

Organizations working Dameware 12.3.1 and earlier variations are vulnerable to this privilege escalation assault. 

The vulnerability impacts the core distant management service element, which is prime to Dameware’s distant administration capabilities. 

System directors ought to instantly assess their present Dameware deployments to find out publicity danger.

The privilege escalation mechanism exploits the service’s permission mannequin throughout routine operations. 

As soon as triggered, the vulnerability can present attackers with elevated system privileges, enabling them to put in malware, entry restricted recordsdata, modify system configurations, or set up persistent entry mechanisms. 

This escalation can compromise total community segments if the affected system serves as a pivot level for lateral motion.

The CVSS 7.8 Excessive severity score displays the potential for important affect regardless of the native entry requirement. 

In enterprise environments the place Dameware is deployed throughout a number of techniques, this vulnerability might facilitate speedy privilege escalation throughout the infrastructure if not promptly addressed.

SolarWinds launched Dameware 12.3.2 on June 2, 2025, as a focused safety replace addressing this vital vulnerability. Past the first safety repair, the replace contains a number of further enhancements.

The discharge addresses proxy certificates replace points when machine IP addresses change, resolves session disconnection issues throughout web proxy IP modifications, and permits CA certificates downloads in 2-server configurations.

The replace additionally incorporates library upgrades, together with the CodeJock Xtreme Toolkit Professional library, zlib library, Chilkat API library, and varied .NET dependencies. These upgrades improve total system stability and safety posture.

System directors also needs to overview entry controls, implement monitoring for uncommon privilege escalation actions, and guarantee correct community segmentation to restrict potential affect from future vulnerabilities.

Rejoice 9 years of ANY.RUN! Unlock the complete energy of TI Lookup plan (100/300/600/1,000+ search requests), and your request quota will double.

Cyber Security News Tags:Control, Dameware, Escalation, Privilege, Remote, Service, SolarWinds, Vulnerability

Post navigation

Previous Post: Microsoft and CrowdStrike Teaming Up to Bring Clarity To Threat Actor Mapping
Next Post: Australia Enforces Ransomware Payment Reporting

Related Posts

INE Expands Cross-Skilling Innovations INE Expands Cross-Skilling Innovations Cyber Security News
Odyssey Stealer Escalates Threats to macOS Users Odyssey Stealer Escalates Threats to macOS Users Cyber Security News
Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware Cyber Security News
Hackers Exploit DFIR Tool Velociraptor In Ransomware Attacks Hackers Exploit DFIR Tool Velociraptor In Ransomware Attacks Cyber Security News
Evasive Panda APT Using AitM Attack and DNS Poisoning to Deliver Malware Evasive Panda APT Using AitM Attack and DNS Poisoning to Deliver Malware Cyber Security News
PyPI Released Advisory to Prevent ZIP Parser Confusion Attacks on Python Package Installers PyPI Released Advisory to Prevent ZIP Parser Confusion Attacks on Python Package Installers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News