Description
Hex-Rays IDA Pro 9.2 and 9.3 before 9.3sp2 does not block Clang dependency-file generation (via argument injection), which allows attackers to place their code into a plugins directory if the victim uses an attacker-supplied .i64 file.
Published: 2026-05-09
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The updated description confirms that Hex‑Rays IDA Pro 9.2 and 9.3 before 9.3sp2 do not block Clang dependency‑file generation, enabling attackers to supply a crafted .i64 file that injects arguments into the compilation process. This injection permits writing arbitrary files into the user’s plugins directory. If the attacker controls that directory, the malicious code will be executed automatically when IDA launches, leading to arbitrary code execution and potential privilege escalation. The vulnerability, classified as CWE‑88, allows the injected arguments to write arbitrary files into the plugins directory, resulting in the same impact as described earlier.

Affected Systems

The issue affects Hex‑Rays IDA Pro versions 9.2 and the pre‑9.3sp2 releases of 9.3. Users running these versions on any operating system are vulnerable if they open a malicious .i64 file in an environment where the plugins folder is writable.

Risk and Exploitability

The CVSS score of 6.5 reflects moderate severity, and the EPSS score is not available, so the probability of exploitation is not quantified. The vulnerability is not listed in the CISA KEV catalog. An attacker can exploit it by supplying a manipulated .i64 file, which is a local attack vector that requires the victim to open the file. Proper version control and verification of files are required to mitigate the threat. If the attacker succeeds, the impact could reach full system compromise.

Generated by OpenCVE AI on May 10, 2026 at 08:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to IDA Pro 9.3sp2 or later, which blocks Clang dependency‑file generation and removes the injection path.
  • Restrict write permissions on the plugins directory and monitor it for unexpected or unauthorized files.
  • Avoid opening .i64 files from untrusted or unknown sources until the system is verified or the vulnerability is mitigated.

Generated by OpenCVE AI on May 10, 2026 at 08:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 10 May 2026 09:15:00 +0000

Type Values Removed Values Added
Title IDA Pro Vulnerability Allows Arbitrary Plugin Injection via Clang Dependency‑File Generation

Sun, 10 May 2026 07:45:00 +0000

Type Values Removed Values Added
Description Hex-Rays IDA Pro 9.2 and 9.3 before 9.3sp2 does not block Clang dependency-file generation (via argument injection), which allows attackers to place their code into a plugins directry if the victim uses an attacker-supplied .i64 file. Hex-Rays IDA Pro 9.2 and 9.3 before 9.3sp2 does not block Clang dependency-file generation (via argument injection), which allows attackers to place their code into a plugins directory if the victim uses an attacker-supplied .i64 file.

Sat, 09 May 2026 23:45:00 +0000

Type Values Removed Values Added
Title IDA Pro Vulnerability Allows Arbitrary Plugin Injection via Clang Dependency‑File Generation

Sat, 09 May 2026 22:15:00 +0000

Type Values Removed Values Added
Description Hex-Rays IDA Pro 9.2 and 9.3 before 9.3sp2 does not block Clang dependency-file generation (via argument injection), which allows attackers to place their code into a plugins directry if the victim uses an attacker-supplied .i64 file.
First Time appeared Hex-rays
Hex-rays ida
Weaknesses CWE-88
CPEs cpe:2.3:a:hex-rays:ida:*:*:*:*:*:*:*:*
Vendors & Products Hex-rays
Hex-rays ida
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-10T07:07:20.202Z

Reserved: 2026-05-09T21:47:34.581Z

Link: CVE-2026-45181

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-09T22:16:08.157

Modified: 2026-05-10T08:16:08.500

Link: CVE-2026-45181

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-10T09:00:10Z

Weaknesses