Could Your SASE Client Grant SYSTEM Access?

Article Highlights
Off On

A recently disclosed vulnerability highlights a critical risk within enterprise security stacks, demonstrating how a trusted software agent designed to protect a system can inadvertently become the very key an attacker needs for a complete takeover. A severe privilege escalation flaw, identified as CVE-2025-9142, was discovered within the Check Point Harmony SASE Windows client, affecting all versions prior to 12.2. This vulnerability allowed a local attacker with standard user permissions to write or delete files in arbitrary system locations, a capability that serves as a direct pathway to executing malicious code with the highest possible privileges. The discovery serves as a stark reminder that even sophisticated security solutions are not immune to fundamental programming errors, and a single misstep in validating user-supplied data can unravel an entire system’s defenses, turning a protective tool into a powerful weapon for an intruder. The flaw’s mechanics reveal a classic yet potent attack chain, leveraging a trusted, high-privilege service against itself.

The Anatomy of a Token-Based Exploit

At the heart of this critical vulnerability lies the Perimeter81.Service.exe component, a core process of the Harmony SASE client that operates with SYSTEM-level permissions, granting it unrestricted access to the local machine. The fundamental flaw was rooted in an insufficient validation of JSON Web Tokens (JWT) during the client’s authentication sequence. When a user initiates a login, the client utilizes a custom URI handler, perimeter81://, to pass a JWT to this privileged service. Under normal circumstances, the service should rigorously verify the token’s digital signature to ensure its authenticity and integrity before processing its contents. However, investigations revealed that this crucial verification step was either missing or improperly implemented. This oversight created a significant security loophole, allowing an unauthenticated local attacker to craft a malicious URL containing a tampered JWT and pass it directly to the service. Because the signature was not checked, the service blindly trusted the manipulated token, processing its malicious payload as if it were a legitimate request from an authenticated user.

The exploitation of this token validation flaw unfolds in a carefully orchestrated, two-phase attack. In the initial phase, an attacker leverages their ability to forge a JWT to achieve an arbitrary directory creation primitive. By injecting directory traversal sequences—such as ../../../—into the token’s tenant ID field, the attacker could trick the service into creating a folder structure outside of its intended working directory. To bypass an internal client-side check, this attack required the use of a domain present on a whitelist; however, it was noted that one such domain, p81-falcon.com, was available for public registration, removing a significant barrier. Following this, the second phase involves a sophisticated symbolic link injection technique. Using native Windows tools like Object Manager and RPC Control, the attacker can create specific symlinks that redirect file operations. They then trigger the GenerateAndLoadCertificates() function within the privileged service. This function, which runs as SYSTEM, is then fooled by the symlinks into writing a file, such as a client certificate, to a protected system directory like C:WindowsSystem32 instead of its intended location.

From Arbitrary File Write to Full System Control

The ability to write a file to any location on the system is a powerful primitive that attackers can readily convert into full system compromise, and in this case, the most direct path was through DLL hijacking. Analysis of the Perimeter81.Service.exe process revealed that upon startup, it attempts to load several Dynamic-Link Libraries (DLLs) from its working directory. This behavior is common but becomes a severe security risk when an attacker can control the contents of that directory. By combining the arbitrary file write capability achieved through the JWT and symbolic link attack, an adversary could place a malicious DLL with a specific, expected name into a location where the service would look for it. When the service is next restarted, either by the system or triggered by the attacker, it would load and execute the code within the malicious DLL. Since the service itself runs with SYSTEM privileges, the attacker’s code would inherit those same permissions, effectively completing the privilege escalation from a standard user to the highest level of access on the machine.

Check Point was first notified of this significant security flaw on March 16, 2025, and after a period of development and testing, a patched version of the Harmony SASE client was released. The fix, included in version 12.2 and all subsequent releases, was made available to the public on November 18, 2025. The patch addresses the root cause of the vulnerability by implementing proper and stringent validation of the JWT, ensuring that the service now correctly verifies the digital signature of any incoming token before processing its payload. This prevents an attacker from being able to pass a tampered token to the service, thereby neutralizing the entire attack chain. For organizations deploying this SASE solution, the primary and most critical mitigation step was to ensure an immediate upgrade of all Windows clients to the patched version. As an additional layer of defense, security teams were also advised to enforce policies that restrict local administrative access where possible and to implement application whitelisting solutions, which could further harden systems against DLL hijacking attempts.

Explore more

AI and Trust Will Define the Future of Marketing

The very fabric of digital interaction is being rewoven as brands grapple with a profound paradox: possessing unprecedented technological power to understand customers while facing an equally unprecedented demand for privacy and authenticity. This delicate equilibrium, where the predictive capabilities of artificial intelligence meet the non-negotiable requirement for consumer trust, is no longer a peripheral concern for marketers. It has

Trend Analysis: Strategic Employee Connection

The predictable annual dip in organizational energy following the holiday season represents more than just a case of the winter blues; it is a measurable, hidden tax on productivity, innovation, and morale that quietly drains resources from businesses year after year. As workplaces continue to navigate the complexities of a post-pandemic world, a clear trend is emerging: authentic employee connection

The Great Hiring Regression and How to Stop It

An unhoused man in Hamilton, Ontario, once demonstrated every skill required of a professional bus driver by commandeering a city bus and flawlessly running its route, yet he would never pass a formal job screen. With passengers aboard, he executed stops perfectly, followed traffic regulations, and even enforced fare collection policies. This bizarre yet telling incident is not merely an

Rethinking What Makes a Good Outside Hire

When a company faces turbulent markets and uncertain futures, the board’s instinct is often to seek a savior from the outside, a seasoned generalist whose sprawling résumé promises a wealth of diverse experience to navigate the storm. This impulse to hire for the broadest possible background is a deeply ingrained piece of corporate wisdom. However, recent evidence suggests this strategy

What’s Driving the $12B Private Network Boom?

A profound shift in enterprise connectivity is quietly unfolding, moving beyond traditional networks to embrace dedicated, high-performance cellular infrastructure that promises unprecedented control and reliability. This evolution marks the dawn of a new era, characterized by explosive growth in the private cellular network market. The expansion is no longer an abstract concept but a tangible transformation fueled by organic, end-user-driven