Cyber Posture

CVE-2025-22894

High

Published: 06 February 2025

Published
06 February 2025
Modified
04 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0004 11.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Unprotected Windows messaging channel ('Shatter') issue exists in Defense Platform Home Edition Ver.3.9.51.x and earlier. If an attacker sends a specially crafted message to the specific process of the Windows system where the product is running, arbitrary files in the system may be altered. As a result, an arbitrary DLL may be executed with SYSTEM privilege.

Security Summary

CVE-2025-22894 is an unprotected Windows messaging channel vulnerability, referred to as a 'Shatter' issue, affecting Defense Platform Home Edition versions 3.9.51.x and earlier. The flaw exists in a specific process on Windows systems running the affected software, where an attacker can send a specially crafted message to exploit the unprotected channel. This enables arbitrary file alterations in the system, potentially leading to the execution of an arbitrary DLL with SYSTEM privileges. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and is linked to CWE-422 (Unprotected Control Sphere).

A local attacker with low-privileged (PR:L) access to the Windows system can exploit this vulnerability with low complexity and no user interaction required. By targeting the vulnerable process via the messaging channel, the attacker can modify arbitrary files, such as replacing or injecting a malicious DLL. Successful exploitation results in arbitrary code execution with SYSTEM-level privileges, providing complete control over the system, including high-impact confidentiality, integrity, and availability violations due to the changed scope (S:C).

Advisories detailing mitigation are available from the Japan Vulnerability Notes (JVN) at https://jvn.jp/en/jp/JVN66673020/ and the vendor's security page at https://www.hummingheads.co.jp/dep/storelist/. Security practitioners should review these sources for patch availability, upgrade instructions, or temporary workarounds specific to Defense Platform Home Edition.

Details

CWE(s)
CWE-422

Affected Products

hummingheads
defense platform
≤ 3.9.51.0

References