CVE-2025-1068

There is an untrusted search path vulnerability in Esri ArcGIS AllSource 1.2 and 1.3 that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious executable to the filesystem. When the victim performs a specific action using ArcGIS AllSource, the file could execute and run malicious commands under the context of the victim. This issue is corrected in ArcGIS AllSource 1.2.1 and 1.3.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:esri:arcgis_allsource:1.2:*:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_allsource:1.3:*:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_pro:3.3:*:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_pro:3.4:*:*:*:*:*:*:*

History

20 Jun 2025, 19:48

Type Values Removed Values Added
CPE cpe:2.3:a:esri:arcgis_allsource:1.2:-:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_pro:3.3:-:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_allsource:1.3:-:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_pro:3.4:-:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_allsource:1.3:*:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_allsource:1.2:*:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_pro:3.4:*:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_pro:3.3:*:*:*:*:*:*:*
CWE CWE-426
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.3

04 Mar 2025, 17:22

Type Values Removed Values Added
First Time Esri
Esri arcgis Pro
Esri arcgis Allsource
References () https://www.esri.com/arcgis-blog/products/administration/administration/arcgis-pro-and-arcgis-allsource-patches-address-high-severity-vulnerabilities - () https://www.esri.com/arcgis-blog/products/administration/administration/arcgis-pro-and-arcgis-allsource-patches-address-high-severity-vulnerabilities - Vendor Advisory
CPE cpe:2.3:a:esri:arcgis_allsource:1.2:-:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_pro:3.3:-:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_allsource:1.3:-:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_pro:3.4:-:*:*:*:*:*:*

26 Feb 2025, 00:15

Type Values Removed Values Added
Summary There is an untrusted search path vulnerability in Esri ArcGIS AllSource 1.2 and 1.3 that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious executable to the filesystem. When the victim performs a specific action using ArcGIS AllSource, the file could execute and run malicious commands under the context of the victim. There is an untrusted search path vulnerability in Esri ArcGIS AllSource 1.2 and 1.3 that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious executable to the filesystem. When the victim performs a specific action using ArcGIS AllSource, the file could execute and run malicious commands under the context of the victim. This issue is corrected in ArcGIS AllSource 1.2.1 and 1.3.1.
CVSS v2 : unknown
v3 : 7.3
v2 : unknown
v3 : unknown
CWE CWE-426

25 Feb 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-25 17:15

Updated : 2025-06-20 19:48


NVD link : CVE-2025-1068

Mitre link : CVE-2025-1068


JSON object : View

Products Affected

esri

  • arcgis_allsource
  • arcgis_pro
CWE
CWE-426

Untrusted Search Path