Skip to content

Add content: CVE-2025-1729 - Privilege Escalation Using TPQMAssistant.exe #1046

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conversation

carlospolop
Copy link
Collaborator

🤖 Automated Content Update

This PR was automatically generated by the HackTricks News Bot based on a technical blog post.

📝 Source Information

🎯 Content Summary

Technical Analysis: CVE-2025-1729 in Lenovo TrackPoint Quick Menu

Description

The following analysis examines a Windows privilege escalation vulnerability via DLL sideloading in Lenovo’s TrackPoint Quick Menu (TPQMAssistant.exe), tracked as CVE-2025-1729. A scheduled task (Lenovo\TrackPointQuickMenu\Schedule\ActivationDailyScheduleTask) executes C:\ProgramData\Lenovo\TPQM\Assistant\TPQMAssistant.exe daily at 9:30 AM un...

🔧 Technical Details

DLL Sid​​eloading via Writable Directory: When an application installs to a directory with CREATOR OWNER write permissions and loads a required DLL by name (e.g., hostfxr.dll) without a full path, an attacker can drop a malicious DLL into that directory. On execution, Windows’ DLL search order prioritizes the local directory, loading the attacker’s DLL and achieving code execution under the application’s context.

Scheduled Task Context Escalation:🤖 Agent Actions

I’ve updated the DLL Hijacking guide to include a dedicated case study for CVE-2025-1729 (TPQMAssistant.exe), detailing the phantom DLL hijacking scenario, exploit implementation, attack flow, and mitigation. The References section now includes the blog URL and Microsoft Store link. Let me know if any further refinements are needed!

✅ Review Checklist

  • Content is technically accurate
  • Formatting follows HackTricks style guidelines
  • Links and references are working
  • Content adds educational value
  • No sensitive information is exposed

This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.

@carlospolop
Copy link
Collaborator Author

🔗 Additional Context

Original Blog Post: https://trustedsec.com/blog/cve-2025-1729-privilege-escalation-using-tpqmassistant-exe

Content Categories: Based on the analysis, this content was categorized under "windows-privilege-escalation/dll-sideloading".

Repository Maintenance:

  • MD Files Formatting: 847 files processed

Review Notes:

  • This content was automatically processed and may require human review for accuracy
  • Check that the placement within the repository structure is appropriate
  • Verify that all technical details are correct and up-to-date
  • All .md files have been checked for proper formatting (headers, includes, etc.)

Bot Version: HackTricks News Bot v1.0

@carlospolop carlospolop merged commit 2857ea9 into master Jul 9, 2025
@carlospolop carlospolop deleted the update_CVE-2025-1729_-_Privilege_Escalation_Using_TPQMAss_20250708_192412 branch July 9, 2025 09:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant