Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-22805 | LsiAgent.exe, a component of SysTrack from Lakeside Software, attempts to load several DLL files which are not present in the default installation. If a user-writable directory is present in the SYSTEM PATH environment variable, the user can write a malicious DLL to that directory with arbitrary code. This malicious DLL is executed in the context of NT AUTHORITY\SYSTEM upon service start or restart, due to the Windows default dynamic-link library search order, resulting in local elevation of privileges. |
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 30 Jul 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 29 Jul 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lakeside Software
Lakeside Software systrack |
|
| Vendors & Products |
Lakeside Software
Lakeside Software systrack |
Sun, 27 Jul 2025 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LsiAgent.exe, a component of SysTrack from Lakeside Software, attempts to load several DLL files which are not present in the default installation. If a user-writable directory is present in the SYSTEM PATH environment variable, the user can write a malicious DLL to that directory with arbitrary code. This malicious DLL is executed in the context of NT AUTHORITY\SYSTEM upon service start or restart, due to the Windows default dynamic-link library search order, resulting in local elevation of privileges. | |
| Title | CVE-2025-6241 | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2025-11-03T20:06:53.132Z
Reserved: 2025-06-18T15:18:17.582Z
Link: CVE-2025-6241
Updated: 2025-11-03T20:06:53.132Z
Status : Deferred
Published: 2025-07-27T01:15:29.690
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-6241
No data.
OpenCVE Enrichment
Updated: 2025-07-29T10:01:07Z
No weakness.
EUVD