First published: Tue Feb 25 2025(Updated: )
There is an untrusted search path vulnerability in Esri ArcGIS Pro 3.3 and 3.4 that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious executable to the filesystem. When the victim performs a specific action using ArcGIS ArcGIS Pro, the file could execute and run malicious commands under the context of the victim. This issue is addressed in ArcGIS Pro 3.3.3 and 3.4.1.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
Esri ArcGIS Pro | >=3.3<=3.4 | |
Esri ArcGIS Pro | >=3.3.0<3.3.3>=3.4.0<3.4.1 | |
Esri ArcGIS AllSource | =1.2 | |
Esri ArcGIS AllSource | =1.3 | |
Esri ArcGIS Pro | =3.3 | |
Esri ArcGIS Pro | =3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1067 is classified as a high severity vulnerability that can be exploited by low privileged attackers.
To fix CVE-2025-1067, upgrade Esri ArcGIS Pro to version 3.4.1 or later.
CVE-2025-1067 affects users of Esri ArcGIS Pro versions 3.3 and 3.4.
CVE-2025-1067 is characterized as an untrusted search path vulnerability.
An attacker exploiting CVE-2025-1067 may introduce a malicious executable to the filesystem, compromising the system.