CVE-2025-14405: CWE-427: Uncontrolled Search Path Element in PDFsam Enhanced
PDFsam Enhanced Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows phyiscally-present attackers to escalate privileges on affected installations of PDFsam Enhanced. An attacker must first obtain the ability to mount a malicious drive onto the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-27867.
AI Analysis
Technical Summary
CVE-2025-14405 is a local privilege escalation vulnerability affecting PDFsam Enhanced version 7.0.76.15222. The root cause is an uncontrolled search path element vulnerability (CWE-427) related to how the product loads its OpenSSL configuration file. Specifically, PDFsam Enhanced loads the OpenSSL configuration from an unsecured location, which can be manipulated by an attacker who has physical access to the system and can mount a malicious drive. By placing a crafted OpenSSL configuration file on this drive, the attacker can cause the application to load malicious code, resulting in arbitrary code execution with SYSTEM-level privileges. This vulnerability requires the attacker to have local access and the ability to mount external media, making remote exploitation infeasible. The impact includes full system compromise, allowing the attacker to bypass security controls, access sensitive data, and disrupt system availability. The vulnerability was assigned CVE-2025-14405 and has a CVSS v3.0 score of 6.6, indicating medium severity due to the local attack vector but high impact on confidentiality, integrity, and availability. No public exploits are known at this time, but the vulnerability was disclosed by the Zero Day Initiative (ZDI) under ZDI-CAN-27867. The lack of vendor patches at the time of disclosure necessitates immediate mitigation steps to prevent exploitation.
Potential Impact
For European organizations, this vulnerability poses a significant risk in environments where PDFsam Enhanced is deployed on workstations or servers with physical access by multiple users or in less controlled environments. Successful exploitation can lead to full SYSTEM-level compromise, enabling attackers to steal sensitive information, manipulate documents, or disrupt business operations. Sectors such as government, finance, legal, and critical infrastructure that rely on PDFsam Enhanced for document processing are particularly at risk. The requirement for physical access limits the threat to insider attackers or scenarios where physical security is weak, such as shared office spaces or public terminals. However, the high impact on confidentiality, integrity, and availability means that even limited exploitation can have severe consequences, including data breaches, regulatory non-compliance, and operational downtime. The medium CVSS score reflects the balance between the attack complexity and potential damage. Organizations in Europe must consider this vulnerability in their risk assessments, especially where physical security controls are less stringent or where PDFsam Enhanced is widely used.
Mitigation Recommendations
1. Restrict physical access to systems running PDFsam Enhanced to trusted personnel only, employing badge access, surveillance, and secure storage for devices. 2. Implement strict policies to prevent unauthorized mounting of external drives or media on critical systems, using endpoint security tools to block or alert on such actions. 3. Monitor system logs and file system changes for unexpected loading of configuration files or unusual OpenSSL activity. 4. Once available, promptly apply vendor patches or updates addressing CVE-2025-14405 to eliminate the vulnerability. 5. Consider application whitelisting to prevent execution of unauthorized binaries or scripts loaded via manipulated configuration files. 6. Educate staff about the risks of physical access attacks and enforce clean desk policies to reduce insider threat vectors. 7. Use disk encryption and secure boot mechanisms to reduce the risk of unauthorized drive mounting and code execution. 8. Conduct regular security audits and penetration testing focusing on physical security and local privilege escalation vectors. These targeted mitigations go beyond generic advice by focusing on the physical access requirement and the specific attack vector involving OpenSSL configuration loading.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-14405: CWE-427: Uncontrolled Search Path Element in PDFsam Enhanced
Description
PDFsam Enhanced Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows phyiscally-present attackers to escalate privileges on affected installations of PDFsam Enhanced. An attacker must first obtain the ability to mount a malicious drive onto the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-27867.
AI-Powered Analysis
Technical Analysis
CVE-2025-14405 is a local privilege escalation vulnerability affecting PDFsam Enhanced version 7.0.76.15222. The root cause is an uncontrolled search path element vulnerability (CWE-427) related to how the product loads its OpenSSL configuration file. Specifically, PDFsam Enhanced loads the OpenSSL configuration from an unsecured location, which can be manipulated by an attacker who has physical access to the system and can mount a malicious drive. By placing a crafted OpenSSL configuration file on this drive, the attacker can cause the application to load malicious code, resulting in arbitrary code execution with SYSTEM-level privileges. This vulnerability requires the attacker to have local access and the ability to mount external media, making remote exploitation infeasible. The impact includes full system compromise, allowing the attacker to bypass security controls, access sensitive data, and disrupt system availability. The vulnerability was assigned CVE-2025-14405 and has a CVSS v3.0 score of 6.6, indicating medium severity due to the local attack vector but high impact on confidentiality, integrity, and availability. No public exploits are known at this time, but the vulnerability was disclosed by the Zero Day Initiative (ZDI) under ZDI-CAN-27867. The lack of vendor patches at the time of disclosure necessitates immediate mitigation steps to prevent exploitation.
Potential Impact
For European organizations, this vulnerability poses a significant risk in environments where PDFsam Enhanced is deployed on workstations or servers with physical access by multiple users or in less controlled environments. Successful exploitation can lead to full SYSTEM-level compromise, enabling attackers to steal sensitive information, manipulate documents, or disrupt business operations. Sectors such as government, finance, legal, and critical infrastructure that rely on PDFsam Enhanced for document processing are particularly at risk. The requirement for physical access limits the threat to insider attackers or scenarios where physical security is weak, such as shared office spaces or public terminals. However, the high impact on confidentiality, integrity, and availability means that even limited exploitation can have severe consequences, including data breaches, regulatory non-compliance, and operational downtime. The medium CVSS score reflects the balance between the attack complexity and potential damage. Organizations in Europe must consider this vulnerability in their risk assessments, especially where physical security controls are less stringent or where PDFsam Enhanced is widely used.
Mitigation Recommendations
1. Restrict physical access to systems running PDFsam Enhanced to trusted personnel only, employing badge access, surveillance, and secure storage for devices. 2. Implement strict policies to prevent unauthorized mounting of external drives or media on critical systems, using endpoint security tools to block or alert on such actions. 3. Monitor system logs and file system changes for unexpected loading of configuration files or unusual OpenSSL activity. 4. Once available, promptly apply vendor patches or updates addressing CVE-2025-14405 to eliminate the vulnerability. 5. Consider application whitelisting to prevent execution of unauthorized binaries or scripts loaded via manipulated configuration files. 6. Educate staff about the risks of physical access attacks and enforce clean desk policies to reduce insider threat vectors. 7. Use disk encryption and secure boot mechanisms to reduce the risk of unauthorized drive mounting and code execution. 8. Conduct regular security audits and penetration testing focusing on physical security and local privilege escalation vectors. These targeted mitigations go beyond generic advice by focusing on the physical access requirement and the specific attack vector involving OpenSSL configuration loading.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- zdi
- Date Reserved
- 2025-12-10T01:37:24.865Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 694b0a12d69af40f312b7da5
Added to database: 12/23/2025, 9:30:58 PM
Last enriched: 12/30/2025, 11:57:39 PM
Last updated: 2/7/2026, 3:34:07 PM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.