CVE-2025-22894
Published: 06 February 2025
Description
Unprotected Windows messaging channel ('Shatter') issue exists in Defense Platform Home Edition Ver.3.9.51.x and earlier. If an attacker sends a specially crafted message to the specific process of the Windows system where the product is running, arbitrary files in the system may be altered. As a result, an arbitrary DLL may be executed with SYSTEM privilege.
Security Summary
CVE-2025-22894 is an unprotected Windows messaging channel vulnerability, referred to as a 'Shatter' issue, affecting Defense Platform Home Edition versions 3.9.51.x and earlier. The flaw exists in a specific process on Windows systems running the affected software, where an attacker can send a specially crafted message to exploit the unprotected channel. This enables arbitrary file alterations in the system, potentially leading to the execution of an arbitrary DLL with SYSTEM privileges. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and is linked to CWE-422 (Unprotected Control Sphere).
A local attacker with low-privileged (PR:L) access to the Windows system can exploit this vulnerability with low complexity and no user interaction required. By targeting the vulnerable process via the messaging channel, the attacker can modify arbitrary files, such as replacing or injecting a malicious DLL. Successful exploitation results in arbitrary code execution with SYSTEM-level privileges, providing complete control over the system, including high-impact confidentiality, integrity, and availability violations due to the changed scope (S:C).
Advisories detailing mitigation are available from the Japan Vulnerability Notes (JVN) at https://jvn.jp/en/jp/JVN66673020/ and the vendor's security page at https://www.hummingheads.co.jp/dep/storelist/. Security practitioners should review these sources for patch availability, upgrade instructions, or temporary workarounds specific to Defense Platform Home Edition.
Details
- CWE(s)