The RupsMon.exe service executable in UPSilon 2000 has insecure permissions, allowing the 'Everyone' group Full Control. A local attacker can replace the executable with a malicious binary to execute code with SYSTEM privileges or simply change the config path of the service to a command; starting and stopping the service to immediately achieve code execution and privilege escalation
History

Wed, 26 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 26 Nov 2025 02:00:00 +0000

Type Values Removed Values Added
Description The RupsMon.exe service executable in UPSilon 2000 has insecure permissions, allowing the 'Everyone' group Full Control. A local attacker can replace the executable with a malicious binary to execute code with SYSTEM privileges or simply change the config path of the service to a command; starting and stopping the service to immediately achieve code execution and privilege escalation
Title Insecure SYSTEM Service Permissions in UPSilon2000V6.0 (RupsMon.exe) leading to trivial Local Privilege Escalation
Weaknesses CWE-269
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Gridware

Published: 2025-11-26T01:16:40.731Z

Updated: 2025-11-26T15:28:25.062Z

Reserved: 2025-11-26T01:02:56.464Z

Link: CVE-2025-66266

cve-icon Vulnrichment

Updated: 2025-11-26T15:28:16.977Z

cve-icon NVD

Status : Received

Published: 2025-11-26T02:15:49.977

Modified: 2025-11-26T02:15:49.977

Link: CVE-2025-66266

cve-icon Redhat

No data.