Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

JumpCloud Remote Assist Vulnerability Can Expose Systems to Takeover

The issue allows attackers to write arbitrary data to any file, or delete arbitrary files to obtain System privileges.

Vulnerability

A vulnerability in JumpCloud Remote Assist for Windows could allow attackers to escalate privileges and potentially take over endpoints.

The bug exists because, during uninstall and update operations, the application invokes an uninstaller that performs privileged operations on a directory the user controls.

The flaw, tracked as CVE-2025-34352 (CVSS score of 8.5), can be triggered during the removal or update of the JumpCloud Agent.

“The Remote Assist uninstaller performs privileged create, write, execute, and delete actions on predictable files inside a user-writable %TEMP% subdirectory without validating that the directory is trusted or resetting its ACLs when it already exists,” a NIST advisory reads.

This enables an unprivileged local attacker to pre-create the directory, on which the uninstaller then performs operations with NT AUTHORITY\SYSTEM privileges.

According to XM Cyber, which identified the vulnerability, attackers can rely on symbolic links and mount-point redirections to trick the uninstaller into performing operations on protected system files.

Advertisement. Scroll to continue reading.

The JumpCloud Agent, the cybersecurity firm notes, dynamically builds the full path to the Remote Assist folder, using environment variables, and looks for the uninstaller binary in that folder.

Every time the agent is removed, it removes JumpCloud Remote Assist and all other components.

In short, the privileged JumpCloud process performs delete, write, and execute operations on files with predictable filenames, from an untrusted path.

Using mount points and symbolic links, the attacker redirects the privileged operation and writes arbitrary data to any file, including system files, which has two outcomes.

On the one hand, by utilizing a Mount Point/Object Manager namespace attack, a threat actor can write data to the System32\cng.sys driver, which would result in an infinite Blue Screen of Death (BSOD).

On the other hand, an attacker can abuse a Time-of-Check to Time-of-Use (TOCTOU) race condition to delete the content of the Config.Msi folder, replace it, and then use a Windows Installer LPE technique to execute a System shell.

The vulnerability was addressed in JumpCloud Remote Assist for Windows version 0.317.0. Organizations are advised to update to it as soon as possible.

“For vendor risk assessment, confirm that no privileged process executes arbitrary code, reads, or writes to a user-writable directory (like %TEMP%) without explicitly setting or overriding the folder’s Access Control Lists (ACLs),” XM Cyber notes.

A JumpCloud spokesperson provided the following statement to SecurityWeek:

“JumpCloud was aware of a security vulnerability (CVE-2025-34352) discovered and patched in an older version of JumpCloud’s Remote Assist Agent (RAA). Ensuring our customers’ environments are secure is our highest priority, so JumpCloud automatically upgraded all customers’ RAA versions to 0.319.0 in late October.
A security researcher had responsibly disclosed it to JumpCloud and worked with our team throughout the process.
Following the upgrade, JumpCloud performed a comprehensive audit and confirmed all customer environments had the patch applied.”

*Updated with statement from JumpCloud.

Related: In-the-Wild Exploitation of Fresh Fortinet Flaws Begins

Related: Atlassian Patches Critical Apache Tika Flaw

Related: Gladinet CentreStack Flaw Exploited to Hack Organizations

Related: MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.

Nudge Security has appointed Patrick Dillon as its Chief Revenue Officer.

AutoNation has appointed Brian Fricke as Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.