Prior to 25.4.270.0, when wmic.exe is elevated with a full admin token the user can stop the Defendpoint service, bypassing anti-tamper protections. Once the service is disabled, the malicious user can add themselves to Administrators group and run any process with elevated permissions.
History

Mon, 04 Aug 2025 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:beyondtrust:privilege_management_for_windows:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Tue, 29 Jul 2025 08:00:00 +0000

Type Values Removed Values Added
First Time appeared Beyondtrust
Beyondtrust privilege Management For Windows
Vendors & Products Beyondtrust
Beyondtrust privilege Management For Windows

Mon, 28 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 28 Jul 2025 16:00:00 +0000

Type Values Removed Values Added
Description Prior to 25.4.270.0, when wmic.exe is elevated with a full admin token the user can stop the Defendpoint service, bypassing anti-tamper protections. Once the service is disabled, the malicious user can add themselves to Administrators group and run any process with elevated permissions.
Title Privilege Management for Windows - Elevation of Privilege
Weaknesses CWE-424
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: BT

Published: 2025-07-28T15:40:28.381Z

Updated: 2025-07-28T17:22:45.226Z

Reserved: 2025-06-18T18:48:28.860Z

Link: CVE-2025-6250

cve-icon Vulnrichment

Updated: 2025-07-28T17:22:40.297Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-28T16:15:24.947

Modified: 2025-08-04T13:45:22.730

Link: CVE-2025-6250

cve-icon Redhat

No data.