WithSecure Repository: Threat Intelligence
      
      Local privilege escalation by file manipulation on N-central windows agent
An incorrect file handling permission vulnerability exists in the N-central Windows Agent and Probe. Under specific conditions, this flaw can allow a local low-privileged user to execute commands with elevated permissions.
The N-central Windows Agent creates a file using Windows default privileges, which permit any user to modify it. This file is subsequently executed by a Windows operating system component without code signing or integrity checks, making it susceptible to race condition-based file manipulation and privilege escalation.
Affected Software:
            
            N-central versions 2025.2.1 and earlier
Resolution:
            
            Upgrade to N-central version 2025.3 or later.
ID: WITH-ZD-2025-0004
            
            
            
            
            
              Other IDs: 
              CVE-2025-10231
            
            
            
              Application Detailed Category: 
              management_service
            
            
            
              Application Super Category: 
              local_service
            
            
            
              CVSS v3: 
              CVSS:AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
            
            
            
              Preconditions Needed For Attacker: 
              local_user_level_access_required
            
            
            
              References: 
              https://me.n-able.com/s/security-advisory/aArVy0000000jgHKAQ/cve202510231-incorrect-default-permissions-could-lead-to-privilege-escalation
            
            
            
              Version: 
              1.0