CVE-2025-13917 Overview
CVE-2025-13917 is a local privilege escalation vulnerability affecting WSS Agent versions prior to 9.8.5. This vulnerability allows an attacker with low-level privileges on the local system to elevate their access to resources that are normally protected from standard applications or users. The exploitation requires local access and has high complexity, but successful attacks can result in complete compromise of confidentiality, integrity, and availability on affected systems.
Critical Impact
Successful exploitation enables attackers to gain elevated privileges on systems running vulnerable WSS Agent versions, potentially allowing complete system compromise and access to protected resources.
Affected Products
- WSS Agent versions prior to 9.8.5
Discovery Timeline
- 2026-01-28 - CVE-2025-13917 published to NVD
- 2026-01-29 - Last updated in NVD database
Technical Details for CVE-2025-13917
Vulnerability Analysis
This privilege escalation vulnerability (CWE-269: Improper Privilege Management) affects the WSS Agent software, allowing attackers to compromise the application and gain elevated access to protected system resources. The attack requires local access to the target system, making it suitable for scenarios where an attacker has already gained initial foothold through other means or has legitimate low-privilege access.
The vulnerability's local attack vector combined with high attack complexity indicates that exploitation requires specific conditions to be met on the target system. However, once these conditions are satisfied, the impact is severe—affecting all three security dimensions (confidentiality, integrity, and availability) at a high level within the scope of the vulnerable component.
Root Cause
The root cause stems from improper privilege management within the WSS Agent application. CWE-269 describes scenarios where software does not properly assign, modify, track, or check privileges for an actor, creating a pathway for unauthorized privilege elevation. In this case, the WSS Agent fails to adequately protect certain operations or resources from being accessed or manipulated by lower-privileged users.
Attack Vector
The attack vector is local, meaning an attacker must have some form of access to the target system before exploitation. The high complexity rating suggests that the attack may require:
- Specific system configurations or states
- Precise timing or race conditions
- Gathering target-specific information before exploitation
An attacker with low privileges on a system running a vulnerable WSS Agent version could potentially leverage this vulnerability to escalate their privileges, gaining access to sensitive data, system configurations, or the ability to execute code with elevated permissions. This type of vulnerability is particularly dangerous in enterprise environments where WSS Agent may be deployed across numerous endpoints.
Detection Methods for CVE-2025-13917
Indicators of Compromise
- Unexpected privilege changes for user accounts on systems running WSS Agent
- Unusual process behavior or service modifications associated with WSS Agent components
- Anomalous access to protected system resources by low-privilege processes
Detection Strategies
- Monitor systems for WSS Agent versions prior to 9.8.5 to identify vulnerable installations
- Implement endpoint detection rules to identify privilege escalation attempts targeting WSS Agent processes
- Enable detailed logging for WSS Agent service activities and authentication events
- Deploy SentinelOne Singularity Platform for real-time behavioral detection of privilege escalation attempts
Monitoring Recommendations
- Configure alerts for unexpected changes to WSS Agent service configurations or binaries
- Monitor Windows Security Event Logs for privilege elevation events (Event IDs 4672, 4673, 4674)
- Implement file integrity monitoring on WSS Agent installation directories
- Review authentication logs for suspicious local privilege changes
How to Mitigate CVE-2025-13917
Immediate Actions Required
- Inventory all systems running WSS Agent and identify versions prior to 9.8.5
- Prioritize patching systems with higher exposure or access to sensitive resources
- Apply the security update to upgrade WSS Agent to version 9.8.5 or later
- Review system logs for any indicators of prior exploitation attempts
Patch Information
Broadcom has released WSS Agent version 9.8.5 to address this vulnerability. Organizations should apply this update as soon as possible to remediate the privilege escalation risk. The official security advisory is available from Broadcom Security Advisory #36778.
Workarounds
- Restrict local access to systems running vulnerable WSS Agent versions where possible
- Implement the principle of least privilege for user accounts on affected systems
- Apply additional endpoint protection controls to monitor for privilege escalation attempts
- Consider network segmentation to limit the potential impact of compromised systems
# Verify WSS Agent version to determine vulnerability status
# Update to version 9.8.5 or later as indicated in Broadcom Security Advisory #36778
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


