Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Raynet
Raynet rayventory Scan Engine |
|
| Vendors & Products |
Raynet
Raynet rayventory Scan Engine |
Tue, 12 May 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Privilege Escalation via PATH Variable Manipulation in RayVentory Scan Engine |
Mon, 11 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Privilege Escalation via PATH Environment Variable Exposure in RayVentory Scan Engine | |
| Weaknesses | CWE-730 |
Mon, 11 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-427 | |
| Metrics |
cvssV3_1
|
Fri, 08 May 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Privilege Escalation via PATH Environment Variable Exposure in RayVentory Scan Engine | |
| Weaknesses | CWE-730 |
Fri, 08 May 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RayVentory Scan Engine through 12.6 Update 8 allows attackers to gain privileges if they control the value of the PATH environment variable. NOTE: this is disputed because ability of an attacker to control the environment is a site-specific misconfiguration. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-11T19:07:17.525Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-69599
Updated: 2026-05-11T18:58:37.115Z
Status : Awaiting Analysis
Published: 2026-05-08T07:16:28.617
Modified: 2026-05-11T20:25:41.117
Link: CVE-2025-69599
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:51:47Z