Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31107 | iMonitor EAM 9.6394 installs a system service (eamusbsrv64.exe) that runs with NT AUTHORITY\SYSTEM privileges. This service includes an insecure update mechanism that automatically loads files placed in the C:\sysupdate\ directory during startup. Because any local user can create and write to this directory, an attacker can place malicious DLLs or executables in it. Upon service restart, the files are moved to the application’s installation path and executed with SYSTEM privileges, leading to privilege escalation. |
Solution
The vendor was unresponsive and did not answer to our communication attempts. Therefore, a patch is not available for these security issues. End users of this product should contact the vendor and demand a patch.
Workaround
No workaround given by the vendor.
Mon, 03 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 29 Sep 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Imonitor
Imonitor imonitor Eam |
|
| Vendors & Products |
Imonitor
Imonitor imonitor Eam |
Thu, 25 Sep 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
cvssV3_1
|
Thu, 25 Sep 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | iMonitor EAM 9.6394 installs a system service (eamusbsrv64.exe) that runs with NT AUTHORITY\SYSTEM privileges. This service includes an insecure update mechanism that automatically loads files placed in the C:\sysupdate\ directory during startup. Because any local user can create and write to this directory, an attacker can place malicious DLLs or executables in it. Upon service restart, the files are moved to the application’s installation path and executed with SYSTEM privileges, leading to privilege escalation. | |
| Title | Local Privilege Escalation via Insecure Update Mechanism in iMonitor EAM | |
| Weaknesses | CWE-732 | |
| References |
|
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-11-03T18:08:40.379Z
Reserved: 2025-09-16T07:44:45.725Z
Link: CVE-2025-10541
Updated: 2025-11-03T18:08:40.379Z
Status : Awaiting Analysis
Published: 2025-09-25T15:16:09.270
Modified: 2025-11-03T19:15:46.090
Link: CVE-2025-10541
No data.
OpenCVE Enrichment
Updated: 2025-09-29T09:31:34Z
EUVD