JumpCloud Remote Assist漏洞可实现系统权限提升
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是JumpCloud Remote Assist for Windows的一个漏洞,编号是CVE-2025-34352,CVSS评分8.5。这个漏洞允许攻击者提升权限,甚至接管终端。问题出在卸载或更新操作时,应用调用了一个卸载器,在用户控制的目录下执行特权操作。 具体来说,卸载器在%TEMP%子目录下进行创建、写入、执行和删除操作,但没有验证目录是否可信或重置ACL。攻击者可以利用符号链接和挂载点重定向,让卸载器对受保护的系统文件进行操作。 结果可能导致两种情况:一是写入cng.sys驱动导致BSOD;二是利用TOCTOU漏洞删除Config.Msi内容并执行系统shell。这个漏洞已经被修复到版本0.317.0,建议尽快更新。 现在我要把这些信息浓缩到100字以内。要包括漏洞名称、影响、原因、攻击方式和修复措施。可能的结构是:JumpCloud Remote Assist for Windows存在高危漏洞(CVE-2025-34352),CVSS 8.5分,允许攻击者通过特权操作接管设备。原因是在卸载或更新时未验证目录权限。攻击者可利用符号链接和挂载点重定向影响系统文件,导致BSOD或提升权限。已修复至版本0.317.0,建议立即更新。 </think> JumpCloud Remote Assist for Windows 存在高危漏洞(CVE-2025-34352),CVSS 8.5 分。该漏洞允许攻击者通过特权操作接管设备。原因在于卸载或更新时未验证用户控制目录的权限。攻击者可利用符号链接和挂载点重定向影响系统文件,导致蓝屏或提升权限。已修复至版本 0.317.0,建议立即更新以避免风险。 2025-12-16 11:39:54 Author: www.securityweek.com(查看原文) 阅读量:2 收藏

A vulnerability in JumpCloud Remote Assist for Windows could allow attackers to escalate privileges and potentially take over endpoints.

The bug exists because, during uninstall and update operations, the application invokes an uninstaller that performs privileged operations on a directory the user controls.

The flaw, tracked as CVE-2025-34352 (CVSS score of 8.5), can be triggered during the removal or update of the JumpCloud Agent.

“The Remote Assist uninstaller performs privileged create, write, execute, and delete actions on predictable files inside a user-writable %TEMP% subdirectory without validating that the directory is trusted or resetting its ACLs when it already exists,” a NIST advisory reads.

This enables an unprivileged local attacker to pre-create the directory, on which the uninstaller then performs operations with NT AUTHORITY\SYSTEM privileges.

According to XM Cyber, which identified the vulnerability, attackers can rely on symbolic links and mount-point redirections to trick the uninstaller into performing operations on protected system files.

The JumpCloud Agent, the cybersecurity firm notes, dynamically builds the full path to the Remote Assist folder, using environment variables, and looks for the uninstaller binary in that folder.

Every time the agent is removed, it removes JumpCloud Remote Assist and all other components.

Advertisement. Scroll to continue reading.

In short, the privileged JumpCloud process performs delete, write, and execute operations on files with predictable filenames, from an untrusted path.

Using mount points and symbolic links, the attacker redirects the privileged operation and writes arbitrary data to any file, including system files, which has two outcomes.

On the one hand, by utilizing a Mount Point/Object Manager namespace attack, a threat actor can write data to the System32\cng.sys driver, which would result in an infinite Blue Screen of Death (BSOD).

On the other hand, an attacker can abuse a Time-of-Check to Time-of-Use (TOCTOU) race condition to delete the content of the Config.Msi folder, replace it, and then use a Windows Installer LPE technique to execute a System shell.

The vulnerability was addressed in JumpCloud Remote Assist for Windows version 0.317.0. Organizations are advised to update to it as soon as possible.

“For vendor risk assessment, confirm that no privileged process executes arbitrary code, reads, or writes to a user-writable directory (like %TEMP%) without explicitly setting or overriding the folder’s Access Control Lists (ACLs),” XM Cyber notes.

A JumpCloud spokesperson provided the following statement to SecurityWeek:

“JumpCloud was aware of a security vulnerability (CVE-2025-34352) discovered and patched in an older version of JumpCloud’s Remote Assist Agent (RAA). Ensuring our customers’ environments are secure is our highest priority, so JumpCloud automatically upgraded all customers’ RAA versions to 0.319.0 in late October.
A security researcher had responsibly disclosed it to JumpCloud and worked with our team throughout the process.
Following the upgrade, JumpCloud performed a comprehensive audit and confirmed all customer environments had the patch applied.”

*Updated with statement from JumpCloud.

Related: In-the-Wild Exploitation of Fresh Fortinet Flaws Begins

Related: Atlassian Patches Critical Apache Tika Flaw

Related: Gladinet CentreStack Flaw Exploited to Hack Organizations

Related: MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities


文章来源: https://www.securityweek.com/jumpcloud-remote-assist-vulnerability-can-expose-systems-to-takeover/
如有侵权请联系:admin#unsafe.sh