We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-4660

Remote Code Execution in Windows Secure Connector/ HPS Inspection Engine via Insecure Named Pipe Access



Description

A remote code execution vulnerability exists in the Windows agent component of SecureConnector due to improper access controls on a named pipe. The pipe is accessible to the Everyone group and does not restrict remote connections, allowing any network-based attacker to connect without authentication. By interacting with this pipe, an attacker can redirect the agent to communicate with a rogue server that can issue commands via the SecureConnector Agent.  This does not impact Linux or OSX Secure Connector.

Reserved 2025-05-13 | Published 2025-05-13 | Updated 2025-05-13 | Assigner Forescout


HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:C/RE:M/U:Amber

Problem types

CWE-276 Incorrect Default Permissions

Product status

Default status
unaffected

11.1.02.1019
affected

11.3.7
unaffected

Credits

Pen Test Partners finder

References

forescout.my.site.com/support/s/article/

cve.org (CVE-2025-4660)

nvd.nist.gov (CVE-2025-4660)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-4660

Support options

Helpdesk Chat, Email, Knowledgebase