Prior to 25.4.270.0, when wmic.exe is elevated with a full admin token the user can stop the Defendpoint service, bypassing anti-tamper protections. Once the service is disabled, the malicious user can add themselves to Administrators group and run any process with elevated permissions.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-22928 Prior to 25.4.270.0, when wmic.exe is elevated with a full admin token the user can stop the Defendpoint service, bypassing anti-tamper protections. Once the service is disabled, the malicious user can add themselves to Administrators group and run any process with elevated permissions.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 04 Aug 2025 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:beyondtrust:privilege_management_for_windows:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Tue, 29 Jul 2025 08:00:00 +0000

Type Values Removed Values Added
First Time appeared Beyondtrust
Beyondtrust privilege Management For Windows
Vendors & Products Beyondtrust
Beyondtrust privilege Management For Windows

Mon, 28 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 28 Jul 2025 16:00:00 +0000

Type Values Removed Values Added
Description Prior to 25.4.270.0, when wmic.exe is elevated with a full admin token the user can stop the Defendpoint service, bypassing anti-tamper protections. Once the service is disabled, the malicious user can add themselves to Administrators group and run any process with elevated permissions.
Title Privilege Management for Windows - Elevation of Privilege
Weaknesses CWE-424
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: BT

Published:

Updated: 2025-07-28T17:22:45.226Z

Reserved: 2025-06-18T18:48:28.860Z

Link: CVE-2025-6250

cve-icon Vulnrichment

Updated: 2025-07-28T17:22:40.297Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-28T16:15:24.947

Modified: 2025-08-04T13:45:22.730

Link: CVE-2025-6250

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-29T07:59:21Z