A locally authenticated, privileged user can craft a malicious OpenSSL configuration file, potentially leading the agent to load an arbitrary local library. This may impair endpoint defenses and allow the attacker to achieve code execution with SYSTEM-level privileges.
History

Mon, 21 Jul 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 21 Jul 2025 07:15:00 +0000

Type Values Removed Values Added
Description A locally authenticated, privileged user can craft a malicious OpenSSL configuration file, potentially leading the agent to load an arbitrary local library. This may impair endpoint defenses and allow the attacker to achieve code execution with SYSTEM-level privileges.
Weaknesses CWE-94
References
Metrics cvssV4_0

{'score': 6.7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/S:N/AU:Y/R:U/V:D/RE:L/U:Green'}


cve-icon MITRE

Status: PUBLISHED

Assigner: trellix

Published: 2025-07-21T07:08:24.915Z

Updated: 2025-07-21T15:18:14.602Z

Reserved: 2025-01-23T07:31:41.002Z

Link: CVE-2025-0664

cve-icon Vulnrichment

Updated: 2025-07-21T15:18:10.783Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-21T07:15:23.273

Modified: 2025-07-22T13:06:07.260

Link: CVE-2025-0664

cve-icon Redhat

No data.