CVE-2025-40763
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-11

Last updated on: 2025-11-11

Assigner: Siemens AG

Description
A vulnerability has been identified in Altair Grid Engine (All versions < V2026.0.0). Affected products do not properly validate environment variables when loading shared libraries, allowing path hijacking through malicious library substitution. This could allow a local attacker to execute arbitrary code with superuser privileges by manipulating the environment variable and placing a malicious library in the controlled path.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-11
Last Modified
2025-11-11
Generated
2026-05-07
AI Q&A
2025-11-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
siemens altair_grid_engine 2026.0.0
siemens altair_grid_engine 2025.1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-427 The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Altair Grid Engine versions prior to V2026.0.0, where the software does not properly validate environment variables when loading shared libraries. This flaw allows an attacker to perform path hijacking by substituting a malicious library, potentially leading to arbitrary code execution with superuser privileges.


How can this vulnerability impact me? :

If exploited, this vulnerability could allow a local attacker to execute arbitrary code with superuser privileges on the affected system. This means the attacker could gain full control over the system, potentially leading to data theft, system disruption, or further compromise.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart