The RupsMon and USBMate services in UPSilon 2000 run with...
High severity
Unreviewed
Published
Nov 26, 2025
to the GitHub Advisory Database
•
Updated Nov 26, 2025
Description
Published by the National Vulnerability Database
Nov 26, 2025
Published to the GitHub Advisory Database
Nov 26, 2025
Last updated
Nov 26, 2025
The RupsMon and USBMate services in UPSilon 2000 run with SYSTEM privileges and contain unquoted service paths. This allows a local attacker to perform path interception and escalate privileges if they have write permissions to the directories proceeding that of which the real service executables live in
References