Home

Description

iMonitor EAM 9.6394 installs a system service (eamusbsrv64.exe) that runs with NT AUTHORITY\SYSTEM privileges. This service includes an insecure update mechanism that automatically loads files placed in the C:\sysupdate\ directory during startup. Because any local user can create and write to this directory, an attacker can place malicious DLLs or executables in it. Upon service restart, the files are moved to the application’s installation path and executed with SYSTEM privileges, leading to privilege escalation.

PUBLISHED Reserved 2025-09-16 | Published 2025-09-25 | Updated 2025-09-25 | Assigner SEC-VLab

Problem types

CWE-732 Incorrect Permission Assignment for Critical Resource

Product status

Default status
unknown

9.63.94
affected

Credits

Marius Renner, SEC Consult Vulnerability Lab finder

Daniel Hirschberger, SEC Consult Vulnerability Lab finder

Tobias Niemann, SEC Consult Vulnerability Lab finder

Thorger Jansen, SEC Consult Vulnerability Lab finder

References

r.sec-consult.com/imonitor third-party-advisory

cve.org (CVE-2025-10541)

nvd.nist.gov (CVE-2025-10541)

Download JSON