CVE-2025-4660

A remote code execution vulnerability exists in the Windows agent component of SecureConnector due to improper access controls on a named pipe. The pipe is accessible to the Everyone group and does not restrict remote connections, allowing any network-based attacker to connect without authentication. By interacting with this pipe, an attacker can redirect the agent to communicate with a rogue server that can issue commands via the SecureConnector Agent.  This does not impact Linux or OSX Secure Connector.
References
Link Resource
https://forescout.my.site.com/support/s/article/ Permissions Required
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:forescout:secureconnector:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

15 May 2025, 18:38

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:forescout:secureconnector:*:*:*:*:*:*:*:*
References () https://forescout.my.site.com/support/s/article/ - () https://forescout.my.site.com/support/s/article/ - Permissions Required
First Time Microsoft
Forescout secureconnector
Forescout
Microsoft windows
CWE NVD-CWE-Other

13 May 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-13 18:15

Updated : 2025-05-15 18:38


NVD link : CVE-2025-4660

Mitre link : CVE-2025-4660


JSON object : View

Products Affected

microsoft

  • windows

forescout

  • secureconnector