Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.megatec.com.tw/software-download/ |
|
Thu, 27 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Megatec
Megatec upsilon2000 |
|
| Vendors & Products |
Megatec
Megatec upsilon2000 |
Wed, 26 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 26 Nov 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unquoted Service path in AutoStart SYSTEM privileged service | Unquoted Service path in UPSilon2000V6.0 SYSTEM privilege service |
Wed, 26 Nov 2025 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The CMService.exe service runs with SYSTEM privileges and contains an unquoted service path. This allows a local attacker with write privileges to the filesystem to insert a malicious executable in the path, leading to privilege escalation. | |
| Title | Unquoted Service path in AutoStart SYSTEM privileged service | |
| Weaknesses | CWE-428 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Gridware
Published:
Updated: 2025-11-26T16:09:51.264Z
Reserved: 2025-11-26T00:21:58.504Z
Link: CVE-2025-66264
Updated: 2025-11-26T16:09:38.093Z
Status : Deferred
Published: 2025-11-26T01:16:10.023
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-66264
No data.
OpenCVE Enrichment
Updated: 2025-11-27T16:25:53Z