The RupsMon and USBMate services in UPSilon 2000 run with SYSTEM privileges and contain unquoted service paths. This allows a local attacker to perform path interception and escalate privileges if they have write permissions to the directories proceeding that of which the real service executables live in
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 26 Nov 2025 02:00:00 +0000

Type Values Removed Values Added
Description The RupsMon and USBMate services in UPSilon 2000 run with SYSTEM privileges and contain unquoted service paths. This allows a local attacker to perform path interception and escalate privileges if they have write permissions to the directories proceeding that of which the real service executables live in
Title Unquoted Service Path in UPSilon2000V6.0(RupsMon and USBMate) running as SYSTEM
Weaknesses CWE-428
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Gridware

Published:

Updated: 2025-11-26T01:26:11.158Z

Reserved: 2025-11-26T01:02:56.464Z

Link: CVE-2025-66269

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-26T02:15:50.130

Modified: 2025-11-26T02:15:50.130

Link: CVE-2025-66269

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.