Could Your SASE Client Grant SYSTEM Access?

Article Highlights
Off On

A recently disclosed vulnerability highlights a critical risk within enterprise security stacks, demonstrating how a trusted software agent designed to protect a system can inadvertently become the very key an attacker needs for a complete takeover. A severe privilege escalation flaw, identified as CVE-2025-9142, was discovered within the Check Point Harmony SASE Windows client, affecting all versions prior to 12.2. This vulnerability allowed a local attacker with standard user permissions to write or delete files in arbitrary system locations, a capability that serves as a direct pathway to executing malicious code with the highest possible privileges. The discovery serves as a stark reminder that even sophisticated security solutions are not immune to fundamental programming errors, and a single misstep in validating user-supplied data can unravel an entire system’s defenses, turning a protective tool into a powerful weapon for an intruder. The flaw’s mechanics reveal a classic yet potent attack chain, leveraging a trusted, high-privilege service against itself.

The Anatomy of a Token-Based Exploit

At the heart of this critical vulnerability lies the Perimeter81.Service.exe component, a core process of the Harmony SASE client that operates with SYSTEM-level permissions, granting it unrestricted access to the local machine. The fundamental flaw was rooted in an insufficient validation of JSON Web Tokens (JWT) during the client’s authentication sequence. When a user initiates a login, the client utilizes a custom URI handler, perimeter81://, to pass a JWT to this privileged service. Under normal circumstances, the service should rigorously verify the token’s digital signature to ensure its authenticity and integrity before processing its contents. However, investigations revealed that this crucial verification step was either missing or improperly implemented. This oversight created a significant security loophole, allowing an unauthenticated local attacker to craft a malicious URL containing a tampered JWT and pass it directly to the service. Because the signature was not checked, the service blindly trusted the manipulated token, processing its malicious payload as if it were a legitimate request from an authenticated user.

The exploitation of this token validation flaw unfolds in a carefully orchestrated, two-phase attack. In the initial phase, an attacker leverages their ability to forge a JWT to achieve an arbitrary directory creation primitive. By injecting directory traversal sequences—such as ../../../—into the token’s tenant ID field, the attacker could trick the service into creating a folder structure outside of its intended working directory. To bypass an internal client-side check, this attack required the use of a domain present on a whitelist; however, it was noted that one such domain, p81-falcon.com, was available for public registration, removing a significant barrier. Following this, the second phase involves a sophisticated symbolic link injection technique. Using native Windows tools like Object Manager and RPC Control, the attacker can create specific symlinks that redirect file operations. They then trigger the GenerateAndLoadCertificates() function within the privileged service. This function, which runs as SYSTEM, is then fooled by the symlinks into writing a file, such as a client certificate, to a protected system directory like C:WindowsSystem32 instead of its intended location.

From Arbitrary File Write to Full System Control

The ability to write a file to any location on the system is a powerful primitive that attackers can readily convert into full system compromise, and in this case, the most direct path was through DLL hijacking. Analysis of the Perimeter81.Service.exe process revealed that upon startup, it attempts to load several Dynamic-Link Libraries (DLLs) from its working directory. This behavior is common but becomes a severe security risk when an attacker can control the contents of that directory. By combining the arbitrary file write capability achieved through the JWT and symbolic link attack, an adversary could place a malicious DLL with a specific, expected name into a location where the service would look for it. When the service is next restarted, either by the system or triggered by the attacker, it would load and execute the code within the malicious DLL. Since the service itself runs with SYSTEM privileges, the attacker’s code would inherit those same permissions, effectively completing the privilege escalation from a standard user to the highest level of access on the machine.

Check Point was first notified of this significant security flaw on March 16, 2025, and after a period of development and testing, a patched version of the Harmony SASE client was released. The fix, included in version 12.2 and all subsequent releases, was made available to the public on November 18, 2025. The patch addresses the root cause of the vulnerability by implementing proper and stringent validation of the JWT, ensuring that the service now correctly verifies the digital signature of any incoming token before processing its payload. This prevents an attacker from being able to pass a tampered token to the service, thereby neutralizing the entire attack chain. For organizations deploying this SASE solution, the primary and most critical mitigation step was to ensure an immediate upgrade of all Windows clients to the patched version. As an additional layer of defense, security teams were also advised to enforce policies that restrict local administrative access where possible and to implement application whitelisting solutions, which could further harden systems against DLL hijacking attempts.

Explore more

Can AI Restore Meaning and Purpose to the Modern Workplace?

The traditional boundaries of corporate efficiency are currently undergoing a radical transformation as organizations realize that silicon-based intelligence performs best when it serves as a scaffold for human creativity rather than a replacement for it. While artificial intelligence continues to reshape every corner of the global economy, the most successful enterprises are uncovering a profound truth: the ultimate value of

Trend Analysis: Generative AI in Talent Management

The rapid assimilation of generative artificial intelligence into the corporate structure has reached a point where the very tasks once considered the bedrock of professional apprenticeships are being systematically automated into oblivion. While the promise of near-instantaneous productivity is undeniably attractive to the modern executive, a quiet crisis is brewing beneath the surface of the organizational chart. This paradox of

B2B Marketing Must Pivot to Content Reinvestment by 2027

The traditional architecture of digital demand generation is currently fracturing under the immense weight of generative search engines that answer complex buyer queries without ever requiring a click. For over two decades, the operational framework of B2B marketing remained remarkably consistent, relying on a linear progression where search engine optimization drove traffic to corporate websites to exchange gated white papers

How Is AI Reshaping the Modern B2B Buyer Journey?

The silent transformation of the B2B buyer journey has reached a critical juncture where the majority of research occurs long before a sales representative ever enters the conversation. This shift toward self-directed, AI-facilitated exploration has redefined the requirements for agency leadership. To address these evolving dynamics, Allytics has officially promoted Jeff Wells to Vice President, placing him at the helm

FinTurk Launches AI-Powered CRM for Financial Advisors

The modern wealth management office often feels like a digital contradiction where advisors utilize sophisticated market algorithms while simultaneously fighting a losing battle against static spreadsheets and rigid database entries. For decades, the financial industry has tolerated customer relationship management systems that function more like electronic filing cabinets than dynamic business tools. FinTurk enters this landscape with a bold proposition