Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5470: CWE-427 Uncontrolled Search Path Element in Yandex Disk

0
High
VulnerabilityCVE-2025-5470cvecve-2025-5470cwe-427
Published: Tue Dec 09 2025 (12/09/2025, 15:50:39 UTC)
Source: CVE Database V5
Vendor/Project: Yandex
Product: Disk

Description

Uncontrolled Search Path Element vulnerability in Yandex Disk on MacOS allows Search Order Hijacking.This issue affects Disk: before 3.2.45.3275.

AI-Powered Analysis

AILast updated: 12/09/2025, 16:11:40 UTC

Technical Analysis

CVE-2025-5470 is an Uncontrolled Search Path Element vulnerability (CWE-427) identified in Yandex Disk for macOS, affecting versions before 3.2.45.3275. This vulnerability arises when the application improperly manages the search order for loading dynamic libraries or executables, allowing an attacker with limited local privileges to influence which code is loaded during execution. By manipulating the search path, an attacker can cause the application to load malicious libraries or executables, leading to potential arbitrary code execution or privilege escalation. The vulnerability requires local access with some privileges but does not require user interaction, increasing the risk in environments where multiple users share systems or where local access controls are weak. The CVSS 4.0 vector indicates a local attack vector (AV:L), low attack complexity (AC:L), partial privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (all rated high). Although no known exploits are currently reported in the wild, the vulnerability's nature makes it a significant threat, especially in enterprise environments where Yandex Disk is used for file synchronization and storage. The lack of available patches at the time of reporting necessitates immediate mitigation through privilege restrictions and monitoring. This vulnerability highlights the risks of improper path handling in software that interacts with dynamic libraries or executables, emphasizing the need for secure coding practices and thorough validation of search paths.

Potential Impact

For European organizations, this vulnerability poses a significant risk to data confidentiality, integrity, and system availability. Successful exploitation could allow attackers to execute arbitrary code with elevated privileges, potentially leading to data theft, system compromise, or disruption of business operations. Organizations using Yandex Disk on macOS, especially in sectors handling sensitive or regulated data, could face compliance violations and reputational damage if exploited. The local attack vector means that insider threats or attackers who gain limited local access could leverage this vulnerability to escalate privileges or implant persistent malware. Given Yandex Disk's role in file synchronization, compromised systems could serve as entry points for lateral movement within corporate networks. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score indicates that once exploited, the impact could be severe. European entities with cross-border data flows or integration with Russian technology ecosystems should be particularly vigilant due to potential targeted attacks leveraging this vulnerability.

Mitigation Recommendations

Beyond applying patches promptly once available, European organizations should implement strict local privilege management to limit user permissions on macOS systems running Yandex Disk. Employ application whitelisting and integrity monitoring to detect unauthorized changes to executable paths or libraries. Use macOS security features such as System Integrity Protection (SIP) and mandatory access controls to restrict modification of system and application directories. Conduct regular audits of installed software and their versions to identify vulnerable instances of Yandex Disk. Network segmentation can limit the impact of a compromised system, preventing lateral movement. Educate users about the risks of local privilege escalation and enforce strong endpoint security policies. Where possible, consider alternatives or additional layers of encryption for sensitive data synchronized via Yandex Disk. Implement monitoring and alerting for unusual process behaviors or unexpected library loads associated with Yandex Disk processes. Finally, maintain an incident response plan tailored to local privilege escalation and code injection scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
yandex
Date Reserved
2025-06-02T12:52:19.275Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693846bf795dcaf6c50de093

Added to database: 12/9/2025, 3:56:47 PM

Last enriched: 12/9/2025, 4:11:40 PM

Last updated: 12/10/2025, 4:12:12 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats