The RupsMon.exe service executable in UPSilon 2000 has insecure permissions, allowing the 'Everyone' group Full Control. A local attacker can replace the executable with a malicious binary to execute code with SYSTEM privileges or simply change the config path of the service to a command; starting and stopping the service to immediately achieve code execution and privilege escalation
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 26 Nov 2025 02:00:00 +0000

Type Values Removed Values Added
Description The RupsMon.exe service executable in UPSilon 2000 has insecure permissions, allowing the 'Everyone' group Full Control. A local attacker can replace the executable with a malicious binary to execute code with SYSTEM privileges or simply change the config path of the service to a command; starting and stopping the service to immediately achieve code execution and privilege escalation
Title Insecure SYSTEM Service Permissions in UPSilon2000V6.0 (RupsMon.exe) leading to trivial Local Privilege Escalation
Weaknesses CWE-269
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Gridware

Published:

Updated: 2025-11-26T01:20:44.984Z

Reserved: 2025-11-26T01:02:56.464Z

Link: CVE-2025-66266

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-26T02:15:49.977

Modified: 2025-11-26T02:15:49.977

Link: CVE-2025-66266

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.