CVE-2025-46068
Published: 12 January 2026
Description
An issue in Automai Director v.25.2.0 allows a remote attacker to execute arbitrary code via the update mechanism
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the arbitrary code execution vulnerability by requiring timely identification, reporting, and remediation through patching the flawed update mechanism.
Validates inputs to the update mechanism to prevent unrestricted upload of arbitrary executable code as associated with CWE-434.
Verifies the integrity of software updates to prevent and detect unauthorized modifications that could enable remote arbitrary code execution.
Security SummaryAI
CVE-2025-46068 is an arbitrary code execution vulnerability affecting Automai Director version 25.2.0. The flaw resides in the update mechanism, enabling a remote attacker to execute arbitrary code. It is associated with CWE-434 and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The vulnerability was published on 2026-01-12.
A remote attacker with low privileges can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation allows the attacker to achieve high impacts on confidentiality, integrity, and availability, potentially compromising the affected system fully.
Mitigation details are available in related advisories, including the report at https://gist.github.com/ZeroBreach-GmbH/00ea6cce1299e1d999b5d1faac4248f1 and the vendor's site at https://www.automai.com/.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary code execution vulnerability in remote update mechanism enables exploitation of remote services for code execution.