CVE-2025-64457
Analyzed
Analyzed - Analysis Complete
BaseFortify
Publication date: 2025-11-10
Last updated on: 2026-01-12
Assigner: JetBrains s.r.o.
Description
Description
In JetBrains ReSharper, Rider and dotTrace before 2025.2.5 local privilege escalation was possible via race condition
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jetbrains | dottrace | to 2025.2.5 (exc) |
| jetbrains | resharper | to 2025.2.5 (exc) |
| jetbrains | rider | to 2025.2.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-362 | The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently. |
| CWE-367 | The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a local privilege escalation issue in JetBrains dotTrace versions before 2025.2.5. It occurs due to a race condition, which allows a user with limited privileges to potentially gain higher privileges on the affected system.
How can this vulnerability impact me? :
The vulnerability can allow an attacker with local access and limited privileges to escalate their privileges, potentially gaining higher-level access to the system. This could lead to unauthorized actions or access to sensitive information.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70