Published:2025/10/17  Last Updated:2025/10/17

JVN#61182380
Installer of AutoDownloader may insecurely load Dynamic Link Libraries

Overview

Installer of AutoDownloader provided by Panasonic Connect Co., Ltd. may insecurely load Dynamic Link Libraries.

Products Affected

  • AutoDownloader Ver1.2.8

Description

Installer of AutoDownloader provided by Panasonic Connect Co., Ltd. contains the following vulnerability with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries.

  • Uncontrolled search path element (CWE-427)
    • CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 8.4
    • CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Base Score 7.8
    • CVE-2025-11223

Impact

Arbitrary code may be executed with the privilege of the user invoking the installer.

Solution

Stop using the product
The affected product is no longer supported. If the affected installer exists in the device, delete the installer.

The developer recommends that customers should use alternative product "AutoDownloaderLite".

References

  1. Japan Vulnerability Notes JVNTA#91240916
    Insecure DLL Loading and Command Execution Issues on Many Windows Application Programs

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Kazuma Matsumoto of GMO Cybersecurity by IERAE, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE
JVN iPedia JVNDB-2025-000089