CVE-2025-40763
BaseFortify
Publication date: 2025-11-11
Last updated on: 2025-11-11
Assigner: Siemens AG
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| siemens | altair_grid_engine | 2026.0.0 |
| siemens | altair_grid_engine | 2025.1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-427 | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Altair Grid Engine versions prior to V2026.0.0, where the software does not properly validate environment variables when loading shared libraries. This flaw allows an attacker to perform path hijacking by substituting a malicious library, potentially leading to arbitrary code execution with superuser privileges.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow a local attacker to execute arbitrary code with superuser privileges on the affected system. This means the attacker could gain full control over the system, potentially leading to data theft, system disruption, or further compromise.