CVE-2026-5397
Vulnerability Related to an Uncontrolled Search Path Element in a UPS Management Application
Description
It has been identified that a vulnerability (CWE-427) exists in the UPS (Uninterruptible Power Supply) management application, whereby improper permissions on the installation directory allow a malicious actor to place a DLL that is then executed with administrator privileges. If a malicious DLL is placed in the installation directory of this product, there is a possibility that the malicious DLL may be executed by exploiting the product’s behavior of loading missing DLLs from the same directory as the executable during service startup.
INFO
Published Date :
April 15, 2026, 4:11 a.m.
Last Modified :
April 15, 2026, 4:11 a.m.
Remotely Exploit :
No
Source :
OMRON
Affected Products
The following products are affected by CVE-2026-5397
vulnerability.
Even if cvefeed.io is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
No affected product recoded yet
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | HIGH | bba440f9-ef23-4224-aa62-7ac0935d18d1 |
Solution
- Apply least privilege to the installation directory.
- Monitor for unauthorized DLLs in the installation folder.
- Ensure proper application hardening and security configurations.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2026-5397 vulnerability anywhere in the article.