Cyber Posture

CVE-2025-46068

High

Published: 12 January 2026

Published
12 January 2026
Modified
21 January 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0035 57.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

An issue in Automai Director v.25.2.0 allows a remote attacker to execute arbitrary code via the update mechanism

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the arbitrary code execution vulnerability by requiring timely identification, reporting, and remediation through patching the flawed update mechanism.

prevent

Validates inputs to the update mechanism to prevent unrestricted upload of arbitrary executable code as associated with CWE-434.

preventdetect

Verifies the integrity of software updates to prevent and detect unauthorized modifications that could enable remote arbitrary code execution.

Security SummaryAI

CVE-2025-46068 is an arbitrary code execution vulnerability affecting Automai Director version 25.2.0. The flaw resides in the update mechanism, enabling a remote attacker to execute arbitrary code. It is associated with CWE-434 and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The vulnerability was published on 2026-01-12.

A remote attacker with low privileges can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation allows the attacker to achieve high impacts on confidentiality, integrity, and availability, potentially compromising the affected system fully.

Mitigation details are available in related advisories, including the report at https://gist.github.com/ZeroBreach-GmbH/00ea6cce1299e1d999b5d1faac4248f1 and the vendor's site at https://www.automai.com/.

Details

CWE(s)

Affected Products

automai
director
25.2.0

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

Arbitrary code execution vulnerability in remote update mechanism enables exploitation of remote services for code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References