iMonitor EAM 9.6394 installs a system service (eamusbsrv64.exe) that runs with NT AUTHORITY\SYSTEM privileges. This service includes an insecure update mechanism that automatically loads files placed in the C:\sysupdate\ directory during startup. Because any local user can create and write to this directory, an attacker can place malicious DLLs or executables in it. Upon service restart, the files are moved to the application’s installation path and executed with SYSTEM privileges, leading to privilege escalation.
Fixes

Solution

The vendor was unresponsive and did not answer to our communication attempts. Therefore, a patch is not available for these security issues. End users of this product should contact the vendor and demand a patch.


Workaround

No workaround given by the vendor.

History

Thu, 25 Sep 2025 19:15:00 +0000

Type Values Removed Values Added
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 25 Sep 2025 14:45:00 +0000

Type Values Removed Values Added
Description iMonitor EAM 9.6394 installs a system service (eamusbsrv64.exe) that runs with NT AUTHORITY\SYSTEM privileges. This service includes an insecure update mechanism that automatically loads files placed in the C:\sysupdate\ directory during startup. Because any local user can create and write to this directory, an attacker can place malicious DLLs or executables in it. Upon service restart, the files are moved to the application’s installation path and executed with SYSTEM privileges, leading to privilege escalation.
Title Local Privilege Escalation via Insecure Update Mechanism in iMonitor EAM
Weaknesses CWE-732
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2025-09-25T18:27:39.262Z

Reserved: 2025-09-16T07:44:45.725Z

Link: CVE-2025-10541

cve-icon Vulnrichment

Updated: 2025-09-25T18:27:32.400Z

cve-icon NVD

Status : Received

Published: 2025-09-25T15:16:09.270

Modified: 2025-09-25T19:15:42.917

Link: CVE-2025-10541

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.