FKIE_CVE-2026-5397

Vulnerability from fkie_nvd - Published: 2026-04-15 05:16 - Updated: 2026-04-17 15:17
Summary
It has been identified that a vulnerability (CWE-427) exists in the UPS (Uninterruptible Power Supply) management application, whereby improper permissions on the installation directory allow a malicious actor to place a DLL that is then executed with administrator privileges. If a malicious DLL is placed in the installation directory of this product, there is a possibility that the malicious DLL may be executed by exploiting the product’s behavior of loading missing DLLs from the same directory as the executable during service startup.
Impacted products
Vendor Product Version

{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "It has been identified that a vulnerability (CWE-427) exists in the UPS (Uninterruptible Power Supply) management application, whereby improper permissions on the installation directory allow a malicious actor to place a DLL that\u00a0is then executed with administrator privileges.\n\nIf a malicious DLL is placed in the installation directory of this product, there is a possibility that the malicious DLL\u00a0may be executed by exploiting the product\u2019s behavior of loading missing DLLs from the same directory as the executable during service startup."
    }
  ],
  "id": "CVE-2026-5397",
  "lastModified": "2026-04-17T15:17:00.957",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.1,
        "impactScore": 6.0,
        "source": "bba440f9-ef23-4224-aa62-7ac0935d18d1",
        "type": "Secondary"
      }
    ]
  },
  "published": "2026-04-15T05:16:45.740",
  "references": [
    {
      "source": "bba440f9-ef23-4224-aa62-7ac0935d18d1",
      "url": "https://www.omron.com/global/en/inquiry/data/OMSR-2026-001_en.pdf"
    },
    {
      "source": "bba440f9-ef23-4224-aa62-7ac0935d18d1",
      "url": "https://www.omron.com/jp/ja/inquiry/data/OMSR-2026-001_ja.pdf"
    }
  ],
  "sourceIdentifier": "bba440f9-ef23-4224-aa62-7ac0935d18d1",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "bba440f9-ef23-4224-aa62-7ac0935d18d1",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…