CVE-2025-62776
installer · installer Multiple Products, including WTW EAGLE (for Windows)
A high-severity vulnerability has been identified in the installer for WTW EAGLE and potentially other products, tracked as CVE-2025-62776.
Executive summary
A high-severity vulnerability has been identified in the installer for WTW EAGLE and potentially other products, tracked as CVE-2025-62776. This flaw could allow a local attacker to escalate their privileges on a Windows system during the software installation process, potentially leading to a full system compromise. Organizations are urged to apply vendor-supplied security updates immediately to mitigate the risk of unauthorized access and control.
Vulnerability
This vulnerability is a local privilege escalation flaw within the installer component. An attacker with basic user permissions on a target Windows system can exploit this by placing a specially crafted malicious library file (e.g., a DLL) in a specific directory that the installer searches. When a privileged user runs the legitimate installer, it may insecurely load the attacker's malicious library, executing the attacker's code with the elevated permissions of the installer process, typically SYSTEM or Administrator.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.8, posing a significant risk to the organization. Successful exploitation could grant an attacker full administrative control over the affected workstation or server. This could lead to severe consequences, including unauthorized installation of malware (such as ransomware or spyware), exfiltration of sensitive corporate data, disruption of business operations, and the ability for the attacker to move laterally across the network to compromise other systems.
Remediation
Immediate Action: The primary remediation is to apply the security updates provided by the vendor across all affected systems without delay. Prioritize patching on systems accessible by multiple users and those holding sensitive data. After patching, review system and application logs for any signs of compromise that may have occurred prior to the update.
Proactive Monitoring: Implement enhanced monitoring to detect potential exploitation attempts. Security teams should monitor for suspicious process creation originating from the installer executable (e.g., setup.exe, install.msi), especially the spawning of command shells or PowerShell. Use tools like Sysmon or an Endpoint Detection and Response (EDR) solution to monitor for unusual DLL loads from non-standard paths (e.g., %TEMP%, user download folders) during installation routines.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls:
- Restrict Installer Execution: Use application control solutions (e.g., AppLocker) to prevent installers from being run from user-writable directories.
- Principle of Least Privilege: Ensure standard users do not have administrative rights and that installations are only performed by authorized IT personnel.
- Secure Installation Procedures: Download installers directly from the official vendor website and verify their integrity using checksums before execution.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high CVSS score of 7.8 and the potential for a complete system compromise via privilege escalation, this vulnerability requires immediate attention. Although it is not currently listed on the CISA KEV list, its severity warrants urgent action. We strongly recommend that organizations prioritize the deployment of the vendor's security patches to all affected endpoints within their standard emergency patching window. In parallel, security teams should implement the proactive monitoring controls to detect any anomalous activity related to software installations.