8.8
CVE-2025-22894
- EPSS 0.02%
- Veröffentlicht 06.02.2025 08:15:30
- Zuletzt bearbeitet 04.02.2026 20:21:58
- Quelle vultures@jpcert.or.jp
- CVE-Watchlists
- Unerledigt
Unprotected Windows messaging channel ('Shatter') issue exists in Defense Platform Home Edition Ver.3.9.51.x and earlier. If an attacker sends a specially crafted message to the specific process of the Windows system where the product is running, arbitrary files in the system may be altered. As a result, an arbitrary DLL may be executed with SYSTEM privilege.Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Hummingheads ≫ Defense Platform SwEditionhome Version <= 3.9.51.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.057 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2 | 6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
| vultures@jpcert.or.jp | 6.5 | 2 | 4 |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
|
CWE-422 Unprotected Windows Messaging Channel ('Shatter')
The product does not properly verify the source of a message in the Windows Messaging System while running at elevated privileges, creating an alternate channel through which an attacker can directly send a message to the product.