The RupsMon and USBMate services in UPSilon 2000 run with SYSTEM privileges and contain unquoted service paths. This allows a local attacker to perform path interception and escalate privileges if they have write permissions to the directories proceeding that of which the real service executables live in
History

Thu, 27 Nov 2025 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Megatec
Megatec upsilon2000
Vendors & Products Megatec
Megatec upsilon2000

Wed, 26 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 26 Nov 2025 02:00:00 +0000

Type Values Removed Values Added
Description The RupsMon and USBMate services in UPSilon 2000 run with SYSTEM privileges and contain unquoted service paths. This allows a local attacker to perform path interception and escalate privileges if they have write permissions to the directories proceeding that of which the real service executables live in
Title Unquoted Service Path in UPSilon2000V6.0(RupsMon and USBMate) running as SYSTEM
Weaknesses CWE-428
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Gridware

Published:

Updated: 2025-11-26T14:30:14.483Z

Reserved: 2025-11-26T01:02:56.464Z

Link: CVE-2025-66269

cve-icon Vulnrichment

Updated: 2025-11-26T14:20:14.463Z

cve-icon NVD

Status : Received

Published: 2025-11-26T02:15:50.130

Modified: 2025-11-26T02:15:50.130

Link: CVE-2025-66269

cve-icon Redhat

No data.