CVE-2025-14495
Local Privilege Escalation via Exposed Function in SUPERAntiSpyware
Publication date: 2025-12-23
Last updated on: 2025-12-23
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| realdefense | superantispyware | 3.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-749 | The product provides an Applications Programming Interface (API) or similar interface for interaction with external actors, but the interface includes a dangerous method or function that is not properly restricted. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the SAS Core Service of RealDefense SUPERAntiSpyware and involves an exposed dangerous function. It allows a local attacker, who already has the ability to run low-privileged code on the system, to escalate their privileges to SYSTEM level and execute arbitrary code with high privileges.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an attacker to gain SYSTEM-level privileges on the affected system. This means the attacker can execute arbitrary code with the highest level of access, potentially leading to full control over the system, compromising confidentiality, integrity, and availability of data and system resources.