CVE-2025-62776

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code by placing malicious DLL files in locations where the WTW EAGLE installer searches for them. It affects users running the vulnerable installer on Windows systems. The attacker needs local access or ability to place files in specific directories.

💻 Affected Systems

Products:
  • WTW EAGLE for Windows
Versions: 3.0.8.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the installer component, not the running application. Vulnerability exists during installation process.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with installer privileges, potentially leading to persistence, data theft, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or code execution with installer user privileges, allowing installation of malware or backdoors.

🟢

If Mitigated

Limited impact if proper file permissions prevent unauthorized DLL placement in search paths.

🌐 Internet-Facing: LOW - Requires local access or ability to place files on target system.
🏢 Internal Only: MEDIUM - Insider threats or compromised internal accounts could exploit this during installation processes.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to place malicious DLL in installer's search path, which typically requires some level of local access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for latest version

Vendor Advisory: https://wtw.support/wtw/eagle-app-cms-win/

Restart Required: No

Instructions:

1. Visit the vendor advisory URL. 2. Download the latest installer version. 3. Uninstall vulnerable version. 4. Install updated version using new installer.

🔧 Temporary Workarounds

Restrict DLL search paths

windows

Use Windows policies to restrict DLL search order and prevent loading from current directory

Set CWDIllegalInDllSearch registry value to 0xFFFFFFFF

Secure installation directories

windows

Ensure installer runs from secure, write-protected directories

🧯 If You Can't Patch

  • Run installer only from trusted, secure directories with restricted write permissions
  • Monitor for suspicious DLL files in installation directories and temporary locations

🔍 How to Verify

Check if Vulnerable:

Check if using WTW EAGLE installer version 3.0.8.0 on Windows

Check Version:

Check program properties or installation logs for version information

Verify Fix Applied:

Verify installed version is newer than 3.0.8.0 and check vendor advisory for specific fixed version

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DLL loading events during installation
  • Installation from unusual directories

Network Indicators:

  • None - local exploitation only

SIEM Query:

Process creation events for installer.exe with DLL loading from non-standard paths

🔗 References

📤 Share & Export