CVE-2025-64695

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code by exploiting an uncontrolled search path element in the LogStare Collector installer for Windows. When a user runs the installer, malicious DLLs placed in specific directories could be loaded, leading to code execution with the user's privileges. Organizations using LogStare Collector on Windows systems are affected.

💻 Affected Systems

Products:
  • LogStare Collector
Versions: All versions prior to the patched release
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations where the installer is executed by users with local access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise if exploited by an attacker with local access, potentially leading to privilege escalation, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive data or system resources.

🟢

If Mitigated

Limited impact if proper access controls restrict local user privileges and prevent unauthorized file placement.

🌐 Internet-Facing: LOW - This requires local access to the system, not directly exploitable over the network.
🏢 Internal Only: HIGH - Internal attackers or malware with local access can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to place malicious DLLs in specific directories before installer execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://www.logstare.com/vulnerability/2025-001/

Restart Required: No

Instructions:

1. Visit the vendor advisory URL. 2. Download the latest patched version of LogStare Collector. 3. Uninstall the vulnerable version. 4. Install the patched version following vendor instructions.

🔧 Temporary Workarounds

Restrict installer execution

windows

Limit who can execute the LogStare Collector installer to prevent exploitation.

Implement DLL search order hardening

windows

Use Windows policies to restrict DLL search paths and prevent loading from untrusted directories.

🧯 If You Can't Patch

  • Restrict local user privileges to prevent unauthorized file placement in installer directories.
  • Monitor for suspicious DLL files in installer directories and unexpected installer executions.

🔍 How to Verify

Check if Vulnerable:

Check LogStare Collector version against vendor advisory; if using any version before the patched release, you are vulnerable.

Check Version:

Check LogStare Collector documentation for version check command specific to your installation.

Verify Fix Applied:

Verify installation of the patched version specified in the vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DLL loads during installer execution
  • Unauthorized file creation in installer directories

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

Search for process creation events related to LogStare Collector installer with suspicious DLL load patterns.

🔗 References

📤 Share & Export