Description
RayVentory Scan Engine through 12.6 Update 8 allows attackers to gain privileges if they control the value of the PATH environment variable. NOTE: this is disputed because ability of an attacker to control the environment is a site-specific misconfiguration.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in RayVentory Scan Engine allows an attacker to gain elevated privileges by manipulating the PATH environment variable used by the scan engine. If an attacker can control this variable, the engine will execute arbitrary binaries, potentially leading to full system takeover during the scanning process. This is a classic environment variable injection flaw that can result in unauthorized access and compromise of data integrity.

Affected Systems

RayVentory Scan Engine versions up to 12.6 Update 8 are affected. The issue specifically exists in the scanning component that resolves executables via the PATH variable. No other versions are listed as vulnerable.

Risk and Exploitability

The likelihood of exploitation is limited to environments where an attacker can affect the PATH variable, implying a site‑specific misconfiguration. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, suggesting a lower public exploitation risk. Nevertheless, the CVSS score is not provided, but the nature of the flaw indicates a high potential impact should the environment be compromised. The primary attack vector is local or privileged configuration, and remediation is straightforward through version update.

Generated by OpenCVE AI on May 8, 2026 at 07:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade RayVentory Scan Engine to version 12.6 Update 9 or later, where the PATH handling issue has been fixed.
  • If an upgrade is not immediately possible, restrict the PATH variable for the service or ensure the service runs under a non‑privileged account with a minimal, trusted PATH.
  • Monitor the environment for attempts to modify the PATH variable and audit service execution logs for anomalous activity.

Generated by OpenCVE AI on May 8, 2026 at 07:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 07:45:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via PATH Environment Variable Exposure in RayVentory Scan Engine
Weaknesses CWE-730

Fri, 08 May 2026 06:30:00 +0000

Type Values Removed Values Added
Description RayVentory Scan Engine through 12.6 Update 8 allows attackers to gain privileges if they control the value of the PATH environment variable. NOTE: this is disputed because ability of an attacker to control the environment is a site-specific misconfiguration.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-08T06:08:35.396Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-69599

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T07:16:28.617

Modified: 2026-05-08T07:16:28.617

Link: CVE-2025-69599

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T07:30:03Z

Weaknesses