CVE-2025-0707
Published: 24 January 2025
Summary
CVE-2025-0707 is a high-severity Untrusted Search Path (CWE-426) vulnerability. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique DLL Search Order Hijacking (T1038); ranked at the 21.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the untrusted search path vulnerability in CRYPTBASE.dll by requiring timely flaw remediation through patching the affected Startup component.
Enforces secure configuration settings to restrict DLL search paths to trusted directories, preventing loading of malicious DLLs from untrusted locations.
Verifies the integrity and authenticity of software components like CRYPTBASE.dll, blocking or detecting substitution of malicious DLLs via untrusted search paths.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Untrusted search path (CWE-426) in CRYPTBASE.dll startup component directly enables DLL Search Order Hijacking (T1038) for code execution.
NVD Description
A vulnerability was found in Rise Group Rise Mode Temp CPU 2.1. It has been classified as critical. This affects an unknown part in the library CRYPTBASE.dll of the component Startup. The manipulation leads to untrusted search path. The attack…
more
needs to be approached locally.
Deeper analysisAI
CVE-2025-0707 is a critical vulnerability discovered in Rise Group Rise Mode Temp CPU version 2.1, specifically affecting an unknown part of the CRYPTBASE.dll library within the Startup component. Published on January 24, 2025, the issue stems from an untrusted search path flaw, classified under CWE-426, with a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Exploitation requires local access with low privileges and involves low-complexity manipulation of the untrusted search path, needing no user interaction. A successful attack can result in high impacts to confidentiality, integrity, and availability, potentially allowing the attacker to execute arbitrary code or gain significant control over the affected system.
Advisories published by VulDB provide further details on the vulnerability, including submission and identification records. Security practitioners should consult the following references for mitigation guidance and updates: https://vuldb.com/?ctiid.293235, https://vuldb.com/?id.293235, and https://vuldb.com/?submit.481088.
Details
- CWE(s)