Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.megatec.com.tw/software-download/ |
|
Thu, 27 Nov 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Megatec
Megatec upsilon2000 |
|
| Vendors & Products |
Megatec
Megatec upsilon2000 |
Wed, 26 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 26 Nov 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The RupsMon.exe service executable in UPSilon 2000 has insecure permissions, allowing the 'Everyone' group Full Control. A local attacker can replace the executable with a malicious binary to execute code with SYSTEM privileges or simply change the config path of the service to a command; starting and stopping the service to immediately achieve code execution and privilege escalation | |
| Title | Insecure SYSTEM Service Permissions in UPSilon2000V6.0 (RupsMon.exe) leading to trivial Local Privilege Escalation | |
| Weaknesses | CWE-269 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Gridware
Published:
Updated: 2025-11-26T15:28:25.062Z
Reserved: 2025-11-26T01:02:56.464Z
Link: CVE-2025-66266
Updated: 2025-11-26T15:28:16.977Z
Status : Deferred
Published: 2025-11-26T02:15:49.977
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-66266
No data.
OpenCVE Enrichment
Updated: 2025-11-27T09:45:48Z