CVE-2025-14405
Unknown Unknown - Not Provided
Uncontrolled Search Path Vulnerability in PDFsam Enhanced Enables Privilege Escalation

Publication date: 2025-12-23

Last updated on: 2025-12-23

Assigner: Zero Day Initiative

Description
PDFsam Enhanced Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows phyiscally-present attackers to escalate privileges on affected installations of PDFsam Enhanced. An attacker must first obtain the ability to mount a malicious drive onto the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-27867.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-23
Last Modified
2025-12-23
Generated
2026-05-07
AI Q&A
2025-12-24
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
openssl openssl *
pdfsam enhanced *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-427 The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in PDFsam Enhanced involves an uncontrolled search path element related to OpenSSL configuration. Specifically, the product loads an OpenSSL configuration file from an unsecured location. An attacker who can physically mount a malicious drive onto the target system can exploit this flaw to escalate privileges and execute arbitrary code with SYSTEM-level access.


How can this vulnerability impact me? :

If exploited, this vulnerability allows an attacker with physical access to escalate their privileges on the affected system to SYSTEM level, potentially leading to full control over the system, unauthorized code execution, and compromise of sensitive data or system integrity.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that the OpenSSL configuration file is loaded from a secure location that cannot be influenced by an attacker. Prevent attackers from mounting malicious drives on the system by restricting physical access and controlling removable media usage. Applying any available patches or updates from PDFsam Enhanced or OpenSSL vendors is also recommended.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart