PatchSiren cyber security CVE debrief
CVE-2026-45181 Blog CVE debrief
CVE-2026-45181 is a medium-severity issue in Hex-Rays IDA Pro 9.2 and 9.3 before 9.3sp2. The problem is that IDA does not block Clang dependency-file generation through argument injection. If a victim opens an attacker-supplied .i64 file, the issue can cause attacker code to be written into a plugins directory. Hex-Rays lists the fix in 9.3sp2.
- Vendor
- Blog
- Product
- Unknown
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-09
- Original CVE updated
- 2026-05-10
- Advisory published
- 2026-05-09
- Advisory updated
- 2026-05-10
Who should care
IDA Pro users and administrators, especially anyone who opens or analyzes .i64 files from untrusted or third-party sources. Security teams that rely on IDA in shared workstations, reverse-engineering labs, or malware-analysis environments should also treat this as relevant.
Technical summary
NVD describes the weakness as CWE-88 (argument injection). The supplied CVE record says IDA Pro before 9.3sp2 does not block Clang dependency-file generation via injected arguments. In the reported scenario, an attacker-supplied .i64 file can influence that behavior enough to place attacker-controlled code into a plugins directory. The issue is tied to local interaction (UI:R) and has CVSS 3.1 vector AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L.
Defensive priority
Prioritize patching if your environment opens untrusted .i64 files or uses IDA on shared systems. The score is medium (6.5), but the workflow impact can be meaningful because the flaw is triggered through analysis of attacker-supplied project files.
Recommended defensive actions
- Upgrade Hex-Rays IDA Pro to 9.3sp2 or later.
- Treat .i64 files from untrusted sources as high risk and isolate their analysis.
- Restrict where IDA can read and write files during analysis to reduce the impact of file-placement behavior.
- Review plugin directories and related startup paths for unexpected or newly added files after analyzing suspicious projects.
- Update internal guidance for reverse-engineering or malware-analysis workflows to include this CVE.
Evidence notes
Based only on the supplied CVE record and official references. The CVE description states the affected products, the pre-9.3sp2 condition, the Clang dependency-file generation/argument-injection issue, and the .i64-triggered plugin-directory write outcome. NVD lists CWE-88 and the CVSS 3.1 vector AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L. Published 2026-05-09 and modified 2026-05-10; no KEV entry was supplied.
Official resources
Publicly disclosed on 2026-05-09; the supplied record was modified on 2026-05-10. No CISA KEV entry was supplied.