CVE-2025-68623 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: March 11, 2026
Microsoft DirectX End-User Runtime Web Installer - Privilege Escalation
Overview
Microsoft DirectX End-User Runtime Web Installer 9.29.1974.0 contains a privilege escalation caused by writable %TEMP% folder allowing replacement of downloaded executables during installation, letting low-privilege users execute code with HIGH integrity.
Severity & Score
Impact
Low-privilege users can execute code with HIGH integrity, potentially escalating to SYSTEM privileges.
Mitigation
Update to the latest version of Microsoft DirectX End-User Runtime Web Installer.
References
Social Media Activity(1 post)
š CVE-2025-68623 - High (8.8) In Microsoft DirectX End-User Runtime Web Installer 9.29.1974.0, a low-privilege user can replace an executable file during the installation process, which may result in unintended elevation of privileges. During installation, the installer runs w... š https://www.thehackerwire.com/vulnerability/CVE-2025-68623/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2025-68623
- Severity
- High
- CVSS Score
- 8.8
- Type
- broken_access_control
- Status
- new
- EPSS
- 1.1%
- Social Posts
- 1
CWE
- CWE-284
CVSS Metrics
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H