CVE-2025-3771

A path or symbolic link manipulation vulnerability in SIR 1.0.3 and prior versions allows an authenticated non-admin local user to overwrite system files with SIR backup files, which can potentially cause a system crash. This was achieved by adding a malicious entry to the registry under the Trellix SIR registry folder or via policy or with a junction symbolic link to files that the user would not normally have permission to acces
CVSS

No CVSS.

Configurations

No configuration.

History

26 Jun 2025, 12:15

Type Values Removed Values Added
Summary (en) Vulnerability allows local user to write registry backup files into another location set by the user by creating junction symlink in System Information Reporter. (en) A path or symbolic link manipulation vulnerability in SIR 1.0.3 and prior versions allows an authenticated non-admin local user to overwrite system files with SIR backup files, which can potentially cause a system crash. This was achieved by adding a malicious entry to the registry under the Trellix SIR registry folder or via policy or with a junction symbolic link to files that the user would not normally have permission to acces
References
  • {'url': 'https://fireeye.lightning.force.com/lightning/r/Best_Practices__kav/ka0Pi000000EUhNIAW/view', 'source': 'trellixpsirt@trellix.com'}
  • () https://thrive.trellix.com/s/article/000014635 -

26 Jun 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-26 11:15

Updated : 2025-06-26 18:57


NVD link : CVE-2025-3771

Mitre link : CVE-2025-3771

CVE.ORG link : CVE-2025-3771


JSON object : View

Products Affected

No product.

CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')