A local privilege escalation vulnerability in Bitdefender Total Security 27.0.46.231 allows low-privileged attackers to elevate privileges. The issue arises from bdservicehost.exe deleting files from a user-writable directory (C:\ProgramData\Atc\Feedback) without proper symbolic link validation, enabling arbitrary file deletion. This issue is chained with a file copy operation during network events and a filter driver bypass via DLL injection to achieve arbitrary file copy and code execution as elevated user.
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "30.0.25.77"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "27.10.45.497"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7.9.20.515"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "27.10.45.497"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "27.10.45.497"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-7073.json"