The RupsMon.exe service executable in UPSilon 2000 has insecure permissions, allowing the 'Everyone' group Full Control. A local attacker can replace the executable with a malicious binary to execute code with SYSTEM privileges or simply change the config path of the service to a command; starting and stopping the service to immediately achieve code execution and privilege escalation
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.megatec.com.tw/software-download/ |
|
History
Wed, 26 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 26 Nov 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The RupsMon.exe service executable in UPSilon 2000 has insecure permissions, allowing the 'Everyone' group Full Control. A local attacker can replace the executable with a malicious binary to execute code with SYSTEM privileges or simply change the config path of the service to a command; starting and stopping the service to immediately achieve code execution and privilege escalation | |
| Title | Insecure SYSTEM Service Permissions in UPSilon2000V6.0 (RupsMon.exe) leading to trivial Local Privilege Escalation | |
| Weaknesses | CWE-269 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Gridware
Published: 2025-11-26T01:16:40.731Z
Updated: 2025-11-26T15:28:25.062Z
Reserved: 2025-11-26T01:02:56.464Z
Link: CVE-2025-66266
Updated: 2025-11-26T15:28:16.977Z
Status : Received
Published: 2025-11-26T02:15:49.977
Modified: 2025-11-26T02:15:49.977
Link: CVE-2025-66266
No data.