7.3
CVE-2025-1068
- EPSS 0.03%
- Veröffentlicht 25.02.2025 17:15:13
- Zuletzt bearbeitet 04.03.2025 17:37:41
- Quelle psirt@esri.com
- CVE-Watchlists
- Unerledigt
There is an untrusted search path vulnerability in Esri ArcGIS AllSource 1.2 and 1.3 that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious executable to the filesystem. When the victim performs a specific action using ArcGIS AllSource, the file could execute and run malicious commands under the context of the victim. This issue is corrected in ArcGIS AllSource 1.2.1 and 1.3.1.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Esri ≫ Arcgis Allsource Version1.2 Update-
Esri ≫ Arcgis Allsource Version1.3 Update-
Esri ≫ Arcgis Pro Version3.3 Update-
Esri ≫ Arcgis Pro Version3.4 Update-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.095 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@esri.com | 7.3 | 1.3 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
|
CWE-426 Untrusted Search Path
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.