Critical Local Privilege Escalation Uncovered in JumpCloud Agent

Researchers have uncovered a critical vulnerability in the JumpCloud Remote Assist for Windows agent that allows low-privileged local users to exploit insecure file operations—arbitrary file write/delete—performed by the agent running as NT AUTHORITY\SYSTEM within the user’s temporary directory. This vulnerability is immediately exploitable to achieve Local Privilege Escalation (LPE) or cause a Denial of Service (DoS).

More details can be found here: https://xmcyber.com/blog/jumpshot-xm-cyber-uncovers-critical-local-privilege-escalation-cve-2025-34352-in-jumpcloud-agent/

Jim Routh, Chief Trust Officer at Saviynt, commented:

“This vulnerability is “eye candy” for threat actors as it offers an approach to obtain privileged access over MS Windows devices at scale covering over 180,000 enterprises. Threat actors prefer to use privileged access capabilities, given the flexibility for using administrative access to change system configurations and monetize the data harvested with a low probability of detection. 

Enterprises have an opportunity to upgrade their privileged user management (PAM) system capabilities beyond password vaulting to include continuous validation of activity compared with an established pattern that operates in real time. Continuous validation capabilities can be built or bought as products today. Most PAM providers don’t offer continuous validation yet, but will in the near future. A mature PAM capability will reduce the risk of this threat tactic and vulnerability having a significant impact on an enterprise.” 

This highlights the need to keep up with threats like these. Because until a PAM solution does some sort of continuous validation that can be trusted, humans will have to make sure that this isn’t an avenue that the bad guys can use to get into an organization.

Leave a Reply

Discover more from The IT Nerd

Subscribe now to keep reading and get access to the full archive.

Continue reading