December 2025
A newly disclosed critical vulnerability in the JumpCloud Remote Assist for Windows agent highlights the ongoing risk posed by flaws in endpoint management tooling. Tracked as CVE-2025-34352, the issue enables both local privilege escalation (LPE) and denial-of-service (DoS) attacks, allowing a low-privileged user to gain full SYSTEM-level control of a Windows device.
The vulnerability affects all JumpCloud Remote Assist agent versions prior to 0.317.0 and has significant implications for organisations that rely on JumpCloud for identity, device, and remote support operations.
At a strategic level, this issue is serious not because it requires sophisticated exploitation, but because it breaks a fundamental security boundary.
The flaw exists in the agent’s uninstallation and update workflow, which runs with NT AUTHORITY\SYSTEM privileges. During this process, the agent performs file write and delete operations inside the user-writable %TEMP% directory.
This creates a dangerous condition where a low-privileged local user can:
Redirect privileged file operations using standard Windows link-following techniques
Force SYSTEM-level processes to overwrite or delete protected system files
Escalate privileges to full SYSTEM access
Once SYSTEM privileges are obtained, the endpoint should be considered fully compromised.
Successful exploitation enables outcomes that go well beyond a single endpoint disruption:
Persistent SYSTEM-level access, granting absolute control over the device
Corruption of critical Windows drivers, causing repeated Blue Screen of Death (BSOD) crashes
Deletion of protected system directories, rendering systems unstable or unbootable
Long-term persistence, enabling follow-on attacks such as credential theft, lateral movement, and tampering with security controls
Notably, exploitation can be triggered during normal agent updates or uninstallation, meaning attackers do not need to wait for unusual administrative actions to occur.
JumpCloud is widely adopted, serving over 180,000 organisations across 160 countries, with strong uptake among Small to Medium-sized Enterprises (SMEs) and Managed Service Providers (MSPs).
Remote Assist is frequently deployed by IT teams and MSPs to manage endpoints remotely, making it:
Highly privileged by design
Present across large numbers of devices
Trusted by administrators and security tooling
This combination makes vulnerabilities in such platforms particularly attractive to attackers, as a single flaw can be reliably reproduced across many endpoints.
This vulnerability reinforces a recurring theme in modern security incidents:
Endpoint management tools are high-value targets
SYSTEM-level processes interacting with user-writable paths are inherently dangerous
Local privilege escalation remains one of the most reliable attack paths, especially in environments where endpoints are widely managed but lightly monitored
Even without remote exploitation, LPE flaws provide attackers with the leverage they need once they gain any form of local access.
Organisations using JumpCloud Remote Assist for Windows should act immediately:
Upgrade all affected agents to version 0.317.0 or later
This release contains the fix for CVE-2025-34352 and should be treated as mandatory.
For internal tooling and third-party platforms:
Avoid SYSTEM-level file operations in user-writable directories such as %TEMP%
Enforce strict validation and hardened file handling for privileged workflows
Limit opportunities for local user access where not required
Monitor for abnormal agent uninstall or update behaviour
Ensure endpoint detection and response tooling is capable of detecting post-exploitation activity, not just initial access
CVE-2025-34352 is a reminder that trusted endpoint tooling operates with extreme privilege, and any weakness in how those privileges are handled can have outsized consequences.
For organisations, particularly SMEs and MSPs, this incident underscores the need to:
Maintain rapid patching discipline
Treat endpoint management platforms as critical security infrastructure
Assume that local compromise plus privilege escalation equals full breach
Prompt remediation reduces immediate risk - but sustained resilience requires ongoing scrutiny of how privileged software behaves on endpoints.