CVE-2025-57392
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-10

Last updated on: 2025-09-17

Assigner: MITRE

Description
BenimPOS Masaustu 3.0.x is affected by insecure file permissions. The application installation directory grants Everyone and BUILTIN\Users groups FILE_ALL_ACCESS, allowing local users to replace or modify .exe and .dll files. This may lead to privilege escalation or arbitrary code execution upon launch by another user or elevated context.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-10
Last Modified
2025-09-17
Generated
2026-05-07
AI Q&A
2025-09-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
benimpos benimpos 3.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-732 The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in BenimPOS Desktop 3.0 is due to insecure file permissions on the application installation directory. The directory grants full access (FILE_ALL_ACCESS) to all users, including standard users, allowing them to modify or replace executable (.exe) and dynamic link library (.dll) files. This means a local user can alter the application files, potentially inserting malicious code or replacing the application with a harmful executable. [1]


How can this vulnerability impact me? :

The vulnerability can lead to critical impacts such as privilege escalation, where a standard user can gain higher privileges by impersonating processes with administrative rights. It also allows malicious code injection by modifying executable or DLL files to insert backdoors, and application manipulation that can deceive users by altering the POS functionalities. Essentially, an attacker can execute arbitrary code with elevated privileges on the affected system. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking the file permissions on the BenimPOS installation directory. Using the Sysinternals tool AccessChk.exe, run the command: `accesschk.exe -dqvw "C:\Program Files (x86)\BenimPOS"`. This command will show if the directory grants FILE_ALL_ACCESS permissions to the "Everyone" and "BUILTIN\Users" groups, indicating the vulnerability. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately restrict write permissions on the BenimPOS installation directory so that only Administrators and SYSTEM have write access. Configure proper Access Control Lists (ACLs) during installation or manually to prevent standard users from modifying executable (.exe) and dynamic link library (.dll) files within the directory. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart