Impact
The installer for RATOC RAID Monitoring Manager for Windows searches the current directory to load required DLLs. If a malicious DLL is placed in that directory, the installer will load it and execute arbitrary code at install time. This vulnerability allows an attacker to run code with administrator privileges, potentially compromising the entire system, exfiltrating data, or establishing persistence.
Affected Systems
RATOC Systems, Inc. produces the RAID Monitoring Manager for Windows. No specific versions are listed, so any version employing this installer logic is potentially vulnerable until the vendor releases a fix.
Risk and Exploitability
The CVSS base score of 8.4 indicates high severity. EPSS information is not provided, and the issue is not listed in any known exploited vulnerabilities catalog, suggesting limited or no widespread exploitation to date. The likely attack vector is local: an attacker must place a crafted DLL in the installation directory and run the installer on the target machine. Successful exploitation would run the malicious code with administrator rights, giving full control of the affected system.
OpenCVE Enrichment