CVE-2025-5470

N/A Unknown

📋 TL;DR

This CVE describes a Search Order Hijacking vulnerability in Yandex Disk for macOS, where an attacker could place malicious files in locations that the application searches before legitimate ones. This affects macOS users running Yandex Disk versions before 3.2.45.3275.

💻 Affected Systems

Products:
  • Yandex Disk
Versions: before 3.2.45.3275
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS installations of Yandex Disk. Requires local access or ability to place files in search paths.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could execute arbitrary code with the privileges of the Yandex Disk application, potentially leading to full system compromise if the application runs with elevated privileges.

🟠

Likely Case

Local privilege escalation or execution of malicious payloads when users launch Yandex Disk, potentially leading to data theft or further system compromise.

🟢

If Mitigated

Limited impact if proper file permissions and application sandboxing are enforced, restricting the attacker's ability to place malicious files in search paths.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to place malicious files in specific directories. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.45.3275

Vendor Advisory: https://yandex.com/bugbounty/i/hall-of-fame-products

Restart Required: Yes

Instructions:

1. Open Yandex Disk application. 2. Go to Settings > About. 3. Check current version. 4. If below 3.2.45.3275, update through the application's update mechanism or download from official Yandex website. 5. Restart the application after update.

🔧 Temporary Workarounds

Restrict write permissions to application directories

macOS

Prevent unauthorized users from writing to directories that Yandex Disk searches during execution

sudo chmod -R o-w /Applications/Yandex.Disk.app
sudo chmod -R o-w ~/Library/Application\ Support/Yandex.Disk

🧯 If You Can't Patch

  • Remove or disable Yandex Disk if not essential
  • Implement strict file permissions and monitor for unauthorized file creation in application directories

🔍 How to Verify

Check if Vulnerable:

Check Yandex Disk version in application settings. If version is below 3.2.45.3275, the system is vulnerable.

Check Version:

defaults read /Applications/Yandex.Disk.app/Contents/Info.plist CFBundleShortVersionString

Verify Fix Applied:

Confirm version is 3.2.45.3275 or higher in application settings and verify application functions normally.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation in Yandex Disk directories
  • Process execution from unexpected locations

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

process.name:"Yandex.Disk" AND file.path:("*/Library/Application Support/Yandex.Disk/*" OR "/Applications/Yandex.Disk.app/*") AND event.action:"create"

🔗 References

📤 Share & Export