CVE-2025-34352
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-04
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jumpcloud | remote_assist | 0.317.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-378 | Opening temporary files without appropriate measures or controls can leave the file, its contents and any function that it impacts vulnerable to attack. |
| CWE-59 | The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in JumpCloud Remote Assist for Windows versions prior to 0.317.0. The uninstaller, which runs with SYSTEM privileges during agent uninstall or update, performs privileged file operations in a user-writable temporary directory without validating its trustworthiness or resetting permissions. A local low-privileged attacker can exploit this by pre-creating the directory with weak permissions and using mount-point or symbolic-link redirection to cause arbitrary file writes or deletions in protected locations. This can lead to denial of service or local privilege escalation to SYSTEM.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing a local attacker with low privileges to overwrite or delete sensitive system files, causing denial of service or escalating their privileges to SYSTEM level. This can compromise system integrity, availability, and security, potentially allowing the attacker to gain full control over the affected system.
What immediate steps should I take to mitigate this vulnerability?
Upgrade JumpCloud Remote Assist for Windows to version 0.317.0 or later, as this version includes the fix for the vulnerability. Additionally, ensure that the Remote Assist uninstaller is not run with untrusted or weak permissions on the %TEMP% directory to prevent exploitation.