CVE-2025-14497
Local Privilege Escalation in RealDefense SUPERAntiSpyware SAS Core Service
Publication date: 2025-12-23
Last updated on: 2025-12-23
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| realdefense | superantispyware | 3.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-749 | The product provides an Applications Programming Interface (API) or similar interface for interaction with external actors, but the interface includes a dangerous method or function that is not properly restricted. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the SAS Core Service of RealDefense SUPERAntiSpyware and involves an exposed dangerous function. It allows a local attacker, who already has the ability to execute low-privileged code on the system, to escalate their privileges to SYSTEM level and execute arbitrary code with high privileges.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an attacker to gain SYSTEM-level privileges on the affected system. This means the attacker can execute arbitrary code with the highest level of permissions, potentially leading to full control over the system, unauthorized access to sensitive data, and disruption of system operations.