CVE-2025-69599
Awaiting Analysis Awaiting Analysis - Queue
RayVentory Scan Engine Privilege Escalation via PATH Variable

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: MITRE

Description
RayVentory Scan Engine through 12.6 Update 8 allows attackers to gain privileges if they control the value of the PATH environment variable. NOTE: this is disputed because ability of an attacker to control the environment is a site-specific misconfiguration.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
raynet rayventory_scan_engine 12.6_update_8
raynet rayventory_scan_engine to 12.6_update_8 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-69599 is a vulnerability in RayVentory Scan Engine versions 12.6 Update 8 and earlier that involves an Uncontrolled Search Path Element (CWE-427). Attackers can manipulate the PATH environment variable to execute arbitrary binaries or shared objects with elevated privileges.

The software uses relative paths when loading shared objects (.so files) and calling system binaries during commands like `rvia getconfig`, `rvia inventory`, or `ndtrack`. An attacker can place malicious binaries (e.g., fake `curl` or `bash` executables) in directories such as `/tmp` and modify the PATH variable to prioritize these directories, causing the software to execute the malicious code.

This vulnerability can be exploited through multiple entry points and affects both binary execution and shared object loading, potentially allowing attackers to gain elevated privileges.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


How can this vulnerability impact me? :

If exploited, this vulnerability allows attackers to execute arbitrary code with elevated privileges by controlling the PATH environment variable. This can lead to unauthorized access, privilege escalation, and potentially full system compromise.

Attackers can replace legitimate binaries or shared objects with malicious versions that run commands or create backdoors, which can severely impact system security and integrity.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the PATH environment variable is being manipulated or contains directories that could allow execution of malicious binaries before system binaries. Specifically, you can look for unusual or writable directories early in the PATH.

You can also verify if the vulnerable RayVentory Scan Engine commands such as `rvia getconfig`, `rvia inventory`, or `ndtrack` are being executed with a manipulated PATH.

  • Check the current PATH environment variable: `echo $PATH`
  • Look for suspicious binaries in writable directories like `/tmp`: `ls -l /tmp`
  • Run the vulnerable commands with a safe PATH to test behavior, for example: `PATH=/usr/bin:/bin rvia getconfig`
  • Search for unquoted service paths or relative path usage in the Scan Engine binaries or scripts.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include ensuring that the PATH environment variable is not controllable by untrusted users and does not include directories where malicious binaries could be placed.

You should restrict write permissions on directories included in the PATH and avoid including writable or temporary directories like `/tmp` in the PATH.

Update the RayVentory Scan Engine to a version later than 12.6 Update 8 where this vulnerability is fixed, if such an update is available.

  • Sanitize or hardcode the PATH environment variable in scripts or service configurations that launch the vulnerable commands.
  • Audit and remove any suspicious or unauthorized binaries from directories in the PATH.
  • Limit user permissions to prevent unauthorized modification of environment variables or executable files.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart