Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64695: Uncontrolled Search Path Element in LogStare Inc. Installer of LogStare Collector (for Windows)

0
High
VulnerabilityCVE-2025-64695cvecve-2025-64695
Published: Fri Nov 21 2025 (11/21/2025, 06:18:05 UTC)
Source: CVE Database V5
Vendor/Project: LogStare Inc.
Product: Installer of LogStare Collector (for Windows)

Description

Uncontrolled search path element issue exists in the installer of LogStare Collector (for Windows). If exploited, arbitrary code may be executed with the privilege of the user invoking the installer.

AI-Powered Analysis

AILast updated: 11/21/2025, 06:52:16 UTC

Technical Analysis

CVE-2025-64695 identifies a vulnerability in the Windows installer of LogStare Collector, a security monitoring product by LogStare Inc. The issue is classified as an uncontrolled search path element vulnerability, meaning the installer improperly handles the directories it searches for executable components or libraries during installation. This flaw can be exploited by an attacker who can place malicious files in a location that the installer searches before the legitimate files, causing the installer to execute arbitrary code with the privileges of the user running it. The vulnerability affects versions 2.4.1 and earlier of the LogStare Collector installer. The CVSS v3.0 score of 7.8 reflects a high severity due to the potential for full compromise of the system's confidentiality, integrity, and availability. The attack vector is local (AV:L), requiring the attacker to have local access, and the attack complexity is low (AC:L), meaning no special conditions are needed beyond placing malicious files in the search path. No privileges are required (PR:N), but user interaction is necessary (UI:R) as the user must run the installer. The scope is unchanged (S:U), indicating the impact is limited to the privileges of the user executing the installer. Although no exploits are currently known in the wild, the vulnerability is critical for environments where installers are run frequently or by users with elevated privileges. The flaw could lead to privilege escalation or persistent compromise if exploited successfully.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in sectors relying on LogStare Collector for security monitoring and log collection. Successful exploitation could allow attackers to execute arbitrary code with user-level privileges, potentially leading to privilege escalation if the installer is run by administrators or service accounts. This could result in unauthorized access to sensitive data, manipulation or deletion of logs, disruption of monitoring capabilities, and broader system compromise. The impact is heightened in critical infrastructure, government, and financial sectors where LogStare products may be deployed. Additionally, the need for user interaction means social engineering or insider threats could facilitate exploitation. The vulnerability undermines trust in the security monitoring infrastructure, potentially delaying detection of other attacks. European organizations with decentralized IT environments or less strict control over software installation processes are particularly vulnerable.

Mitigation Recommendations

To mitigate CVE-2025-64695, European organizations should: 1) Immediately update to a patched version of LogStare Collector installer once available, as no patch links are currently provided but should be monitored from the vendor. 2) Restrict installer execution rights to trusted administrators only, preventing unprivileged users from running the installer. 3) Verify the integrity and authenticity of installer files using cryptographic hashes or digital signatures before execution. 4) Employ application whitelisting and endpoint protection solutions to detect and block unauthorized code execution during installation. 5) Monitor file system locations commonly used in the search path for unauthorized or suspicious files that could be leveraged in the attack. 6) Educate users about the risks of running installers from untrusted sources and enforce policies to reduce unnecessary installation activities. 7) Use isolated or sandboxed environments for software installation when possible to limit potential damage. 8) Maintain comprehensive logging and alerting on installation activities to detect potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2025-11-10T08:13:56.220Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6920092a04dd2c5f9994c018

Added to database: 11/21/2025, 6:39:38 AM

Last enriched: 11/21/2025, 6:52:16 AM

Last updated: 11/21/2025, 3:01:14 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats