Skip to main content

CVE-2025-47422: n/a

High
VulnerabilityCVE-2025-47422cvecve-2025-47422
Published: Tue Jul 08 2025 (07/08/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Advanced Installer before 22.6 has an uncontrolled search path element local privilege escalation vulnerability. When running as SYSTEM in certain configurations, Advanced Installer looks in standard-user writable locations for non-existent binaries and executes them as SYSTEM. A low-privileged attacker can place a malicious binary in a targeted folder; when the installer is executed, the attacker achieves arbitrary SYSTEM code execution.

AI-Powered Analysis

AILast updated: 07/25/2025, 00:40:59 UTC

Technical Analysis

CVE-2025-47422 is a local privilege escalation vulnerability affecting Advanced Installer versions prior to 22.6. The vulnerability arises from an uncontrolled search path element issue, where the installer, when running with SYSTEM privileges under certain configurations, searches for binaries in directories writable by standard users. If the expected binaries are missing, the installer attempts to execute binaries found in these writable locations. This behavior allows a low-privileged attacker to place a malicious binary in a targeted folder that the installer will subsequently execute with SYSTEM privileges, effectively granting the attacker arbitrary code execution at the highest privilege level on the affected system. The vulnerability is classified under CWE-266 (Improper Privilege Management). The CVSS v3.1 base score is 7.5, indicating a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high impact on confidentiality (C:H), and no impact on integrity or availability (I:N/A:N). There are no known exploits in the wild at the time of publication, and no patches have been linked yet. This vulnerability is critical because it allows privilege escalation from a non-privileged user to SYSTEM level without user interaction, potentially enabling attackers to fully compromise affected Windows systems where Advanced Installer is used.

Potential Impact

For European organizations, the impact of CVE-2025-47422 can be significant, especially in environments where Advanced Installer is used for software deployment or system configuration. Successful exploitation allows attackers to escalate privileges from a standard user to SYSTEM, potentially leading to full system compromise, unauthorized access to sensitive data, and the ability to install persistent malware or backdoors. This could disrupt business operations, lead to data breaches, and violate compliance requirements such as GDPR. Organizations relying on automated deployment tools or running Advanced Installer in environments with multiple user privilege levels are particularly at risk. The vulnerability's exploitation does not require user interaction or prior authentication, increasing the risk of automated or opportunistic attacks within compromised internal networks or by malicious insiders.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability. First, they should upgrade Advanced Installer to version 22.6 or later once available, as this will contain the fix for the uncontrolled search path issue. Until a patch is available, organizations should restrict write permissions on directories that Advanced Installer searches for binaries, ensuring that standard users cannot write to these locations. Implementing application whitelisting and restricting execution of unauthorized binaries can also reduce risk. Additionally, monitoring for unusual binary execution patterns and privilege escalation attempts on endpoints can help detect exploitation attempts. Organizations should review deployment configurations to avoid running installers with SYSTEM privileges unnecessarily and consider isolating installation processes to minimize exposure. Finally, educating IT staff about this vulnerability and maintaining strong endpoint security controls will help reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-07T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 686d269f6f40f0eb72f5f8e2

Added to database: 7/8/2025, 2:09:35 PM

Last enriched: 7/25/2025, 12:40:59 AM

Last updated: 8/21/2025, 5:33:52 PM

Views: 36

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats