A local privilege escalation vulnerability in Bitdefender Total Security 27.0.46.231 allows low-privileged attackers to elevate privileges. The issue arises from bdservicehost.exe deleting files from a user-writable directory (C:\ProgramData\Atc\Feedback) without proper symbolic link validation, enabling arbitrary file deletion. This issue is chained with a file copy operation during network events and a filter driver bypass via DLL injection to achieve arbitrary file copy and code execution as elevated user.
Advisories

No advisories yet.

Fixes

Solution

An automatic update to product version 27.10.45.497 fixes the issue


Workaround

No workaround given by the vendor.

History

Wed, 10 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Bitdefender
Bitdefender antivirus Plus
Bitdefender internet Security
Bitdefender total Security
Vendors & Products Bitdefender
Bitdefender antivirus Plus
Bitdefender internet Security
Bitdefender total Security

Wed, 10 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 10:00:00 +0000

Type Values Removed Values Added
Description A local privilege escalation vulnerability in Bitdefender Total Security 27.0.46.231 allows low-privileged attackers to elevate privileges. The issue arises from bdservicehost.exe deleting files from a user-writable directory (C:\ProgramData\Atc\Feedback) without proper symbolic link validation, enabling arbitrary file deletion. This issue is chained with a file copy operation during network events and a filter driver bypass via DLL injection to achieve arbitrary file copy and code execution as elevated user.
Title Local Privilege Escalation via Arbitrary File Operation in Bitdefender Total Security
Weaknesses CWE-59
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Bitdefender

Published:

Updated: 2025-12-11T04:55:18.000Z

Reserved: 2025-07-04T15:58:42.058Z

Link: CVE-2025-7073

cve-icon Vulnrichment

Updated: 2025-12-10T16:53:15.070Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-10T10:16:02.330

Modified: 2025-12-12T15:18:42.140

Link: CVE-2025-7073

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-10T17:48:49Z

Weaknesses