Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5471: CWE-427 Uncontrolled Search Path Element in Yandex Telemost

0
High
VulnerabilityCVE-2025-5471cvecve-2025-5471cwe-427
Published: Tue Dec 09 2025 (12/09/2025, 15:53:23 UTC)
Source: CVE Database V5
Vendor/Project: Yandex
Product: Telemost

Description

Uncontrolled Search Path Element vulnerability in Yandex Telemost on MacOS allows Search Order Hijacking.This issue affects Telemost: before 2.19.1.

AI-Powered Analysis

AILast updated: 12/09/2025, 16:15:37 UTC

Technical Analysis

CVE-2025-5471 is classified under CWE-427, indicating an Uncontrolled Search Path Element vulnerability in Yandex Telemost, a video conferencing application, specifically on macOS platforms. The vulnerability arises because the application does not properly control the order in which it searches for executables or libraries during runtime. An attacker with limited privileges (low-level authenticated user) can exploit this by placing malicious executables or libraries in directories that are searched before the legitimate ones, causing the application to load and execute attacker-controlled code. This search order hijacking can lead to privilege escalation, unauthorized code execution, and compromise of system integrity. The CVSS 4.0 score of 7.3 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity but requiring some privileges and no user interaction. The vulnerability affects all versions of Telemost before 2.19.1 on macOS, with no patches publicly available at the time of publication. No known exploits have been reported in the wild yet, but the potential for targeted attacks exists, especially in environments where Yandex Telemost is widely used. The issue was reserved in June 2025 and published in December 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, this vulnerability presents a significant risk, particularly for those relying on Yandex Telemost for communication and collaboration on macOS devices. Exploitation could lead to unauthorized execution of malicious code, resulting in data breaches, espionage, or disruption of services. The ability to escalate privileges and compromise system integrity threatens sensitive corporate and governmental information. Given the geopolitical tensions involving Russia and Europe, threat actors may target organizations using Russian-origin software like Yandex Telemost to gain footholds or conduct surveillance. The impact extends to critical infrastructure, financial institutions, and public sector entities where confidentiality and availability are paramount. Additionally, the lack of a patch at disclosure time increases exposure duration, elevating risk. The vulnerability could also be leveraged in supply chain attacks if attackers compromise update mechanisms or shared resources.

Mitigation Recommendations

European organizations should immediately verify their use of Yandex Telemost on macOS and prioritize upgrading to version 2.19.1 or later once available. Until patches are released, restrict write permissions on all directories included in the executable and library search paths to prevent unauthorized file placement. Employ application whitelisting and integrity monitoring to detect anomalous executable loads. Use endpoint detection and response (EDR) solutions to monitor for suspicious process behaviors indicative of search order hijacking. Network segmentation can limit lateral movement if exploitation occurs. Educate users and administrators about the risks of running untrusted code and the importance of maintaining updated software. Engage with Yandex support channels for timely patch information and consider alternative communication platforms if risk tolerance is low. Finally, conduct regular audits of system PATH variables and environment configurations to ensure no insecure directories are included.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
yandex
Date Reserved
2025-06-02T12:52:20.730Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69384a3e795dcaf6c511e722

Added to database: 12/9/2025, 4:11:42 PM

Last enriched: 12/9/2025, 4:15:37 PM

Last updated: 12/11/2025, 7:26:44 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats