A significant vulnerability in SolarWinds Dameware Mini Remote Control (MRC), a popular remote desktop management tool used by enterprises worldwide, was uncovered by security researchers.
The flaw, assigned CVE-2025-26396, allows attackers with local access and a low-privileged account to escalate their privileges to higher levels a technique commonly leveraged in post-exploitation phases of network intrusions.
The vulnerability stems from incorrect permissions set on the Dameware Mini Remote Control service, which could allow a local attacker to gain unauthorized access or execute code with elevated privileges.
This flaw, rated as high severity (CVSS 7.8), was responsibly disclosed by Alexander Pudwill in collaboration with Trend Micro Zero Day Initiative and has been addressed in the new Dameware 12.3.2 release.
The root cause of the issue lies in the permissions assigned to the Dameware MRC service files and directories during installation and updates.
Incorrect Access Control Lists (ACLs) could permit a non-administrative user to replace, modify, or execute processes with SYSTEM-level authority.
Attack Scenario
While specific exploit details are being withheld to protect customers, a typical method involves replacing the service executable with a malicious payload. On affected systems, an attacker could execute commands similar to:
powershell# Identify the Dameware service executable path
$service = Get-WmiObject -Class Win32_Service | Where-Object { $_.Name -eq "DamewareMiniRemoteControl" }
$exePath = $service.PathName
# Replace or modify the binary with attacker-controlled code (requires exploit of weak ACL)
Copy-Item "C:\attacker\payload.exe" $exePath -Force
# Restart the Dameware service to trigger the payload
Restart-Service -Name "DamewareMiniRemoteControl"
SolarWinds has responded swiftly by releasing Dameware 12.3.2, which corrects the permissions issue and includes additional security library upgrades, such as updates to CodeJock Xtreme Toolkit Pro, zlib, the Chilkat API, and enhanced .NET dependencies. The patch also addresses several session stability and certificate management bugs identified in previous releases.
IT administrators are strongly advised to:
The exploitation of CVE-2025-26396 demonstrates the continued importance of secure software configurations, timely patch management, and vigilant endpoint monitoring. As attackers increasingly seek privilege escalation paths in enterprise environments, rapid mitigation of such vulnerabilities is critical to defense-in-depth strategies.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…