A path or symbolic link manipulation vulnerability in SIR 1.0.3 and prior versions allows an authenticated non-admin local user to overwrite system files with SIR backup files, which can potentially cause a system crash. This was achieved by adding a malicious entry to the registry under the Trellix SIR registry folder or via policy or with a junction symbolic link to files that the user would not normally have permission to acces
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://thrive.trellix.com/s/article/000014635 |
![]() ![]() |
History
Thu, 26 Jun 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 26 Jun 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 26 Jun 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 26 Jun 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Vulnerability allows local user to write registry backup files into another location set by the user by creating junction symlink in System Information Reporter. | A path or symbolic link manipulation vulnerability in SIR 1.0.3 and prior versions allows an authenticated non-admin local user to overwrite system files with SIR backup files, which can potentially cause a system crash. This was achieved by adding a malicious entry to the registry under the Trellix SIR registry folder or via policy or with a junction symbolic link to files that the user would not normally have permission to acces |
References |
Thu, 26 Jun 2025 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Vulnerability allows local user to write registry backup files into another location set by the user by creating junction symlink in System Information Reporter. | |
Weaknesses | CWE-59 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: trellix
Published: 2025-06-26T11:05:18.669Z
Updated: 2025-06-26T12:59:27.081Z
Reserved: 2025-04-17T16:11:46.344Z
Link: CVE-2025-3771

Updated: 2025-06-26T12:59:23.909Z

Status : Awaiting Analysis
Published: 2025-06-26T11:15:29.030
Modified: 2025-06-26T18:57:43.670
Link: CVE-2025-3771

No data.