Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.megatec.com.tw/software-download/ |
|
Thu, 27 Nov 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Megatec
Megatec upsilon2000 |
|
| Vendors & Products |
Megatec
Megatec upsilon2000 |
Wed, 26 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 26 Nov 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The RupsMon and USBMate services in UPSilon 2000 run with SYSTEM privileges and contain unquoted service paths. This allows a local attacker to perform path interception and escalate privileges if they have write permissions to the directories proceeding that of which the real service executables live in | |
| Title | Unquoted Service Path in UPSilon2000V6.0(RupsMon and USBMate) running as SYSTEM | |
| Weaknesses | CWE-428 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Gridware
Published:
Updated: 2025-11-26T14:30:14.483Z
Reserved: 2025-11-26T01:02:56.464Z
Link: CVE-2025-66269
Updated: 2025-11-26T14:20:14.463Z
Status : Deferred
Published: 2025-11-26T02:15:50.130
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-66269
No data.
OpenCVE Enrichment
Updated: 2025-11-27T09:45:54Z