LsiAgent.exe, a component of SysTrack from Lakeside Software, attempts to load several DLL files which are not present in the default installation. If a user-writable directory is present in the SYSTEM PATH environment variable, the user can write a malicious DLL to that directory with arbitrary code. This malicious DLL is executed in the context of NT AUTHORITY\SYSTEM upon service start or restart, due to the Windows default dynamic-link library search order, resulting in local elevation of privileges.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-22805 LsiAgent.exe, a component of SysTrack from Lakeside Software, attempts to load several DLL files which are not present in the default installation. If a user-writable directory is present in the SYSTEM PATH environment variable, the user can write a malicious DLL to that directory with arbitrary code. This malicious DLL is executed in the context of NT AUTHORITY\SYSTEM upon service start or restart, due to the Windows default dynamic-link library search order, resulting in local elevation of privileges.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 30 Jul 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 29 Jul 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Lakeside Software
Lakeside Software systrack
Vendors & Products Lakeside Software
Lakeside Software systrack

Sun, 27 Jul 2025 01:15:00 +0000

Type Values Removed Values Added
Description LsiAgent.exe, a component of SysTrack from Lakeside Software, attempts to load several DLL files which are not present in the default installation. If a user-writable directory is present in the SYSTEM PATH environment variable, the user can write a malicious DLL to that directory with arbitrary code. This malicious DLL is executed in the context of NT AUTHORITY\SYSTEM upon service start or restart, due to the Windows default dynamic-link library search order, resulting in local elevation of privileges.
Title CVE-2025-6241
References

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2025-07-30T18:20:50.800Z

Reserved: 2025-06-18T15:18:17.582Z

Link: CVE-2025-6241

cve-icon Vulnrichment

Updated: 2025-07-30T18:20:37.235Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-27T01:15:29.690

Modified: 2025-07-30T19:15:49.213

Link: CVE-2025-6241

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-29T10:01:07Z