Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 25 Mar 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unquoted Service Path Allows SYSTEM Privilege Escalation in SANYO DENKI SANUPS Software |
Wed, 25 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sanyo Denki
Sanyo Denki sanups Software Sanyo Denki sanups Software Standalone |
|
| Vendors & Products |
Sanyo Denki
Sanyo Denki sanups Software Sanyo Denki sanups Software Standalone |
Wed, 25 Mar 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SANUPS SOFTWARE provided by SANYO DENKI CO., LTD. registers Windows services with unquoted file paths. A user with the write permission on the root directory of the system drive may execute arbitrary code with SYSTEM privilege. | |
| Weaknesses | CWE-428 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2026-03-25T13:28:29.422Z
Reserved: 2026-03-18T08:17:06.156Z
Link: CVE-2026-33253
Updated: 2026-03-25T13:28:24.408Z
Status : Awaiting Analysis
Published: 2026-03-25T06:16:28.527
Modified: 2026-03-25T15:41:33.977
Link: CVE-2026-33253
No data.
OpenCVE Enrichment
Updated: 2026-03-25T21:15:57Z