{"version":"1.0","provider_name":"Tinexta Defence","provider_url":"https:\/\/tinextadefence.it\/en","title":"JetBrains: CVE-2025-23385 - Vulnerability Analysis Report - Tinexta Defence","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"u2pVG9NU6N\"><a href=\"https:\/\/tinextadefence.it\/en\/jetbrains-cve-2025-23385-vulnerability-analysis-report\/\">JetBrains: CVE-2025-23385 - Vulnerability Analysis Report<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/tinextadefence.it\/en\/jetbrains-cve-2025-23385-vulnerability-analysis-report\/embed\/#?secret=u2pVG9NU6N\" width=\"600\" height=\"338\" title=\"&quot;JetBrains: CVE-2025-23385 - Vulnerability Analysis Report&quot; - Tinexta Defence\" data-secret=\"u2pVG9NU6N\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/tinextadefence.it\/wp-includes\/js\/wp-embed.min.js\n<\/script>","thumbnail_url":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/05\/Business_evidenza.jpg","thumbnail_width":1800,"thumbnail_height":960,"description":"Il nostro Malware Lab ha identificato due vulnerabilit\u00e0 di tipo Local Privilege Escalation (LPE) all\u2019interno del servizio JetBrains ETW Host Service.\u00a0 Il componente interessato, JetBrains.Etw.Collector.Host.exe, \u00e8 parte della suite di strumenti di sviluppo JetBrains dotTrace, utilizzata per l\u2019analisi delle prestazioni delle applicazioni. Tale binario potrebbe essere installato automaticamente tramite l\u2019installer unificato di JetBrains ed \u00e8 [&hellip;]"}