Home

Description

A local attacker with low privileges on the Windows system where the software is installed can exploit this vulnerability to corrupt sensitive data. A data folder is created with very weak privileges, allowing any user logged into the Windows system to modify its content.

PUBLISHED Reserved 2025-08-06 | Published 2025-09-18 | Updated 2025-09-19 | Assigner icscert




HIGH: 7.7CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-276

Product status

Default status
unaffected

5.x (custom)
affected

Default status
unaffected

5.x (custom)
affected

Default status
unaffected

5.x (custom)
affected

Default status
unaffected

5.x (custom)
affected

Default status
unaffected

5.x (custom)
affected

Credits

Diego Giubertoni of Nozomi Networks reported these vulnerabilities to CISA. finder

References

www.cisa.gov/news-events/ics-advisories/icsa-25-261-06

cve.org (CVE-2025-53947)

nvd.nist.gov (CVE-2025-53947)

Download JSON