CVE-2025-50675
BaseFortify
Publication date: 2025-08-07
Last updated on: 2025-08-08
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| lighthouse_data | gpmaw | 14.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-732 | The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in GPMAW 14 involves insecure file permissions in its installation directory, which are set to allow all users full read, write, and execute access. This means any user can modify important files, including executables and the uninstaller. An attacker with normal user access can replace the uninstaller with a malicious version. Since the uninstaller runs with administrative privileges during uninstall, this allows the attacker to execute arbitrary code with admin rights, leading to privilege escalation.
How can this vulnerability impact me? :
This vulnerability can allow an attacker with regular user access to gain administrative privileges on the affected system by exploiting the insecure permissions to replace the uninstaller with malicious code. This privilege escalation can lead to unauthorized control over the system, potentially compromising system integrity, confidentiality, and availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking the permissions of the GPMAW installation directory and its files. Specifically, verify if the directory and files like GPMAW3.exe, Fragment.exe, and GPsetup64_17028.exe have overly permissive read, write, and execute permissions for all users. On a Windows system, you can use commands like 'icacls' to view permissions. For example, run 'icacls "C:\Path\To\GPMAW"' to list the permissions of the installation directory and its contents. Look for permissions that allow 'Everyone' or 'Users' full control or modify rights, which indicate the vulnerability.
What immediate steps should I take to mitigate this vulnerability?
Immediately restrict the permissions on the GPMAW installation directory and its files to prevent unprivileged users from modifying them. Remove write and execute permissions for non-administrative users on the directory and critical executable files such as GPMAW3.exe, Fragment.exe, and GPsetup64_17028.exe. Ensure that only trusted administrators have full control. Additionally, monitor for any unauthorized changes to these files and consider applying any available patches or updates from the vendor once released.