CVE-2025-14405

6.8 MEDIUM

📋 TL;DR

This vulnerability allows physically-present attackers to escalate privileges on PDFsam Enhanced installations by exploiting an insecure OpenSSL configuration file loading mechanism. Attackers can execute arbitrary code with SYSTEM privileges by mounting a malicious drive containing a crafted OpenSSL configuration file. Only users with physical access or ability to mount drives on affected systems are at risk.

💻 Affected Systems

Products:
  • PDFsam Enhanced
Versions: Versions prior to the fix (specific version not specified in advisory)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires OpenSSL configuration file loading from insecure location. Physical access or ability to mount malicious drives is necessary.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM compromise allowing complete control of the system, installation of persistent malware, data theft, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation to SYSTEM on individual workstations where an attacker has physical access or can mount malicious drives.

🟢

If Mitigated

No impact if proper access controls prevent unauthorized drive mounting and the system is patched.

🌐 Internet-Facing: LOW - Requires physical access or ability to mount drives, not remotely exploitable.
🏢 Internal Only: MEDIUM - Internal attackers with physical access to workstations or ability to mount network drives could exploit this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires physical access or ability to mount malicious drives. Exploit involves creating a malicious OpenSSL configuration file on a mounted drive.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references - check vendor advisory

Vendor Advisory: Not provided in references - check PDFsam Enhanced vendor site

Restart Required: Yes

Instructions:

1. Check PDFsam Enhanced vendor website for security advisory
2. Download and install the latest patched version
3. Restart the system to ensure changes take effect
4. Verify the fix by checking version and testing functionality

🔧 Temporary Workarounds

Restrict Drive Mounting

windows

Prevent unauthorized users from mounting external drives or network shares

Use Group Policy: Computer Configuration > Policies > Administrative Templates > System > Removable Storage Access > Set 'All Removable Storage classes: Deny all access' to Enabled

Remove Unnecessary OpenSSL Configuration

windows

Remove or secure OpenSSL configuration files from insecure locations

Check for OpenSSL configuration files in application directories and remove unnecessary ones
Set proper permissions on required configuration files

🧯 If You Can't Patch

  • Restrict physical access to systems running PDFsam Enhanced
  • Implement strict removable media policies and disable auto-run features

🔍 How to Verify

Check if Vulnerable:

Check PDFsam Enhanced version and compare with vendor's patched version list. Look for OpenSSL configuration files in insecure application directories.

Check Version:

Check PDFsam Enhanced 'About' menu or installation directory for version information

Verify Fix Applied:

Verify installed version matches or exceeds patched version from vendor advisory. Test that OpenSSL configuration loading is restricted to secure locations.

📡 Detection & Monitoring

Log Indicators:

  • Unusual drive mounting events
  • PDFsam Enhanced process spawning with elevated privileges
  • OpenSSL configuration file access from unusual locations

Network Indicators:

  • Unusual network drive connections preceding privilege escalation

SIEM Query:

EventID=4663 AND ObjectName LIKE '%openssl.cnf%' OR ProcessName='pdfsam-enhanced.exe' AND IntegrityLevel='System'

🔗 References

📤 Share & Export