We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-0664



Description

A locally authenticated, privileged user can craft a malicious OpenSSL configuration file, potentially leading the agent to load an arbitrary local library. This may impair endpoint defenses and allow the attacker to achieve code execution with SYSTEM-level privileges.

Reserved 2025-01-23 | Published 2025-07-21 | Updated 2025-07-21 | Assigner trellix


MEDIUM: 6.7CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/S:N/AU:Y/R:U/V:D/RE:L/U:Green

Problem types

CWE-94 Improper Control of Generation of Code ('Code Injection')

Product status

Default status
unaffected

36.30.0 and 35.31.28
affected

References

thrive.trellix.com/s/article/000014450

cve.org (CVE-2025-0664)

nvd.nist.gov (CVE-2025-0664)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-0664

Support options

Helpdesk Chat, Email, Knowledgebase