CVE-2025-14491
Local Privilege Escalation in RealDefense SUPERAntiSpyware SAS Core Service
Publication date: 2025-12-23
Last updated on: 2025-12-23
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| realdefense | superantispyware | 3.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-749 | The product provides an Applications Programming Interface (API) or similar interface for interaction with external actors, but the interface includes a dangerous method or function that is not properly restricted. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the SAS Core Service of RealDefense SUPERAntiSpyware and involves an exposed dangerous function. It allows a local attacker, who already has the ability to run low-privileged code on the system, to escalate their privileges to SYSTEM level, enabling them to execute arbitrary code with high-level permissions.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an attacker to gain SYSTEM-level privileges on the affected system. This means the attacker could execute arbitrary code with full control over the system, potentially leading to unauthorized access, data theft, system manipulation, or disruption of services.