Potential Exploitation of RCE Vulnerability CVE-2025-33053 - Process Access
Detects potential exploitation of remote code execution vulnerability CVE-2025-33053 by looking for process access that involves legitimate Windows executables (iediagcmd.exe, CustomShellHost.exe) accessing suspicious executables hosted on WebDAV shares. This indicates an attacker may be exploiting Process.Start() search order manipulation to execute malicious code from attacker-controlled WebDAV servers instead of legitimate system binaries. The vulnerability allows unauthorized code execution through external control of file names or paths via WebDAV.
Sigma rule (View on GitHub)
1title: Potential Exploitation of RCE Vulnerability CVE-2025-33053 - Process Access
2id: 9a2d8b3e-f5a1-4c68-9e21-7d9e1cf8a123
3related:
4 - id: abe06362-a5b9-4371-8724-ebd00cd48a04
5 type: similar
6 - id: 04fc4b22-91a6-495a-879d-0144fec5ec03
7 type: similar
8status: experimental
9description: |
10 Detects potential exploitation of remote code execution vulnerability CVE-2025-33053
11 by looking for process access that involves legitimate Windows executables (iediagcmd.exe, CustomShellHost.exe)
12 accessing suspicious executables hosted on WebDAV shares. This indicates an attacker may be exploiting
13 Process.Start() search order manipulation to execute malicious code from attacker-controlled WebDAV servers
14 instead of legitimate system binaries. The vulnerability allows unauthorized code execution through
15 external control of file names or paths via WebDAV.
16references:
17 - https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33053
18 - https://research.checkpoint.com/2025/stealth-falcon-zero-day/
19author: Swachchhanda Shrawan Poudel (Nextron Systems)
20date: 2025-06-13
21tags:
22 - attack.command-and-control
23 - attack.execution
24 - attack.defense-evasion
25 - attack.t1218
26 - attack.lateral-movement
27 - attack.t1105
28 - detection.emerging-threats
29 - cve.2025-33053
30logsource:
31 category: process_access
32 product: windows
33detection:
34 selection_src:
35 SourceImage:
36 - 'C:\Program Files\internet explorer\iediagcmd.exe'
37 - 'C:\Windows\System32\CustomShellHost.exe'
38 selection_target_dir:
39 - TargetImage|startswith: '\\\\'
40 - TargetImage|contains: '\DavWWWRoot\'
41 selection_target_exe:
42 TargetImage|endswith:
43 - '\route.exe'
44 - '\netsh.exe'
45 - '\makecab.exe'
46 - '\dxdiag.exe'
47 - '\ipconfig.exe'
48 - '\explorer.exe'
49 condition: all of selection_*
50falsepositives:
51 - Unknown
52level: high
References
Related rules
- Potential Exploitation of RCE Vulnerability CVE-2025-33053
- Potential Exploitation of RCE Vulnerability CVE-2025-33053 - Image Load
- Potential Pikabot Infection - Suspicious Command Combinations Via Cmd.EXE
- Potential Suspicious Child Process Of 3CXDesktopApp
- Scheduled Task Creation with Curl and PowerShell Execution Combo