[Japanese]

JVNDB-2025-000089

Installer of AutoDownloader may insecurely load Dynamic Link Libraries

Overview

Installer of AutoDownloader provided by Panasonic Connect Co., Ltd. contains the following vulnerability with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries.
  • Uncontrolled search path element (CWE-427) - CVE-2025-11223

Kazuma Matsumoto of GMO Cybersecurity by IERAE, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 7.8 (High) [IPA Score]
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
Affected Products


Panasonic Connect Co., Ltd.
  • AutoDownloader Ver1.2.8

Impact

Arbitrary code may be executed with the privilege of the user invoking the installer.
Solution

[Stop using the product]
The affected product is no longer supported. If the affected installer exists in the device, delete the installer.

The developer recommends that customers should use alternative product "AutoDownloaderLite".
Vendor Information

Panasonic Connect Co., Ltd.
CWE (What is CWE?)

  1. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2025-11223
References

  1. JVN : JVN#61182380
  2. JVN : Japan Vulnerability Notes JVNTA#91240916
Revision History

  • [2025/10/17]
      Web page was published