CVE-2026-2998
DLL Hijacking in eAI ERP Allows Local Code Execution
Publication date: 2026-02-23
Last updated on: 2026-02-23
Assigner: TWCERT/CC
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| eai_technologies | erp | F2 |
| eai_technologies | erp | From F10 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-426 | The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-2998 is a DLL Hijacking vulnerability found in the ERP software developed by eAI Technologies. It allows an authenticated local attacker with low privileges to place a specially crafted DLL file in the same directory as the ERP program.
By doing so, the attacker can execute arbitrary code within the context of the ERP application without requiring user interaction.
How can this vulnerability impact me? :
This vulnerability can have a significant impact as it allows an attacker to execute arbitrary code on the affected system.
- Confidentiality can be compromised (C:H) as sensitive data may be accessed or leaked.
- Integrity can be affected (I:H) since the attacker can modify data or system behavior.
- Availability can be disrupted (A:H) by causing denial of service or other interruptions.
The attack requires only local access with low privileges and no user interaction, making it easier for an attacker with some access to exploit.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
The recommended immediate step to mitigate this DLL Hijacking vulnerability in the ERP software developed by eAI Technologies is to upgrade the ERP software from version F2 to version F10.
ERP version F10 is based on PowerBuilder 2025 and addresses the vulnerability by preventing attackers from placing crafted DLL files in the same directory as the ERP executable.