Impact
The vulnerability in RayVentory Scan Engine allows an attacker to gain elevated privileges by manipulating the PATH environment variable used by the scan engine. If an attacker can control this variable, the engine will execute arbitrary binaries, potentially leading to full system takeover during the scanning process. This is a classic environment variable injection flaw that can result in unauthorized access and compromise of data integrity.
Affected Systems
RayVentory Scan Engine versions up to 12.6 Update 8 are affected. The issue specifically exists in the scanning component that resolves executables via the PATH variable. No other versions are listed as vulnerable.
Risk and Exploitability
The likelihood of exploitation is limited to environments where an attacker can affect the PATH variable, implying a site‑specific misconfiguration. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, suggesting a lower public exploitation risk. Nevertheless, the CVSS score is not provided, but the nature of the flaw indicates a high potential impact should the environment be compromised. The primary attack vector is local or privileged configuration, and remediation is straightforward through version update.
OpenCVE Enrichment