First published: Tue Jan 28 2025(Updated: )
In JetBrains ReSharper before 2024.3.4, 2024.2.8, and 2024.1.7, Rider before 2024.3.4, 2024.2.8, and 2024.1.7, dotTrace before 2024.3.4, 2024.2.8, and 2024.1.7, ETW Host Service before 16.43, Local Privilege Escalation via the ETW Host Service was possible
Credit: cve@jetbrains.com
Affected Software | Affected Version | How to fix |
---|---|---|
JetBrains ReSharper | <2024.3.4 | |
JetBrains Rider | <2024.3.4 | |
JetBrains dotTrace | <2024.3.4 | |
JetBrains ETW Host Service | <16.43 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-23385 is classified as a local privilege escalation vulnerability.
To mitigate CVE-2025-23385, upgrade JetBrains ReSharper, Rider, dotTrace, or ETW Host Service to the latest versions beyond the affected releases.
CVE-2025-23385 affects users of JetBrains ReSharper, Rider, dotTrace, and ETW Host Service versions before 2024.3.4 or 2024.2.8.
CVE-2025-23385 is a local privilege escalation vulnerability that allows unauthorized access to system resources.
CVE-2025-23385 exploits the ETW Host Service, allowing attackers to gain elevated privileges on affected systems.