LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2025-68623

CVE-2025-68623 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: March 11, 2026

Microsoft DirectX End-User Runtime Web Installer - Privilege Escalation

Published: March 11, 2026Updated: March 11, 2026

Overview

Microsoft DirectX End-User Runtime Web Installer 9.29.1974.0 contains a privilege escalation caused by writable %TEMP% folder allowing replacement of downloaded executables during installation, letting low-privilege users execute code with HIGH integrity.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 1.1%(Probability of exploitation in next 30 days)

Impact

Low-privilege users can execute code with HIGH integrity, potentially escalating to SYSTEM privileges.

Mitigation

Update to the latest version of Microsoft DirectX End-User Runtime Web Installer.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 11, 2026

🟠 CVE-2025-68623 - High (8.8) In Microsoft DirectX End-User Runtime Web Installer 9.29.1974.0, a low-privilege user can replace an executable file during the installation process, which may result in unintended elevation of privileges. During installation, the installer runs w... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2025-68623/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2025-68623
Severity
High
CVSS Score
8.8
Type
broken_access_control
Status
new
EPSS
1.1%
Social Posts
1

CWE

  • CWE-284

CVSS Metrics

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS Score

1.1%Probability of exploitation in the next 30 days