Description
EfficientLab Controlio before v1.3.95 contains a DLL hijacking vulnerability caused by weak folder permissions in the installation directory. A local attacker can place a specially crafted DLL in this directory and achieve arbitrary code execution with highest privileges, because the affected service runs as NT AUTHORITY\SYSTEM.
Published: 2026-04-23
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation via arbitrary code execution
Action: Immediate Patch
AI Analysis

Impact

The flaw is a DLL hijacking weakness in EfficientLab Controlio versions prior to 1.3.95. Weak permissions on the installation directory allow a local user to drop a malicious DLL, which the privileged service loads, leading to execution of attacker code with the SYSTEM account. This gives full control of the machine.

Affected Systems

EfficientLab, LLC Controlio software installations running on Windows where the installation folder has insecure permissions. Versions before v1.3.95 are affected; the vendor recommends applying patch v1.3.95.

Risk and Exploitability

The CVSS base score of 5.1 indicates a moderate severity risk, and the very low EPSS score of less than 1% suggests it is unlikely to be actively exploited in the wild. The vulnerability is not listed in the CISA KEV catalog. Attackers must have local access to the machine and write permission to the installation directory to succeed.

Generated by OpenCVE AI on April 28, 2026 at 14:57 UTC.

Remediation

Vendor Solution

The vendor provides a patch v1.3.95 which should be installed immediately.


OpenCVE Recommended Actions

  • Install the vendor‑provided patch v1.3.95 as soon as possible.
  • Update the folder permissions on the Controlio installation directory to deny write access to non‑admin accounts.
  • Ensure the Controlio service runs with the least privilege necessary; if possible remove SYSTEM rights.

Generated by OpenCVE AI on April 28, 2026 at 14:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
References

Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Efficientlab
Efficientlab controlio
Vendors & Products Efficientlab
Efficientlab controlio

Thu, 23 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Description EfficientLab Controlio before v1.3.95 contains a DLL hijacking vulnerability caused by weak folder permissions in the installation directory. A local attacker can place a specially crafted DLL in this directory and achieve arbitrary code execution with highest privileges, because the affected service runs as NT AUTHORITY\SYSTEM.
Title DLL Hijacking in EfficientLab Controlio Leads to Local Privilege Escalation
Weaknesses CWE-427
References

Subscriptions

Efficientlab Controlio
cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-04-29T19:32:11.851Z

Reserved: 2025-09-16T11:59:48.866Z

Link: CVE-2025-10549

cve-icon Vulnrichment

Updated: 2026-04-29T19:32:11.851Z

cve-icon NVD

Status : Deferred

Published: 2026-04-23T07:16:39.720

Modified: 2026-05-19T15:35:04.330

Link: CVE-2025-10549

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T15:00:14Z

Weaknesses