CVE-2025-66264
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-26

Last updated on: 2025-11-26

Assigner: Gridware

Description
The CMService.exe service runs with SYSTEM privileges and contains an unquoted service path. This allows a local attacker with write privileges to the filesystem to insert a malicious executable in the path, leading to privilege escalation.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-26
Last Modified
2025-11-26
Generated
2026-05-07
AI Q&A
2025-11-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cmservice cmservice *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-428 The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves the CMService.exe service, which runs with SYSTEM privileges and has an unquoted service path. Because the path is unquoted, a local attacker who has write access to the filesystem can place a malicious executable in the path. When the service starts, it may execute this malicious file, resulting in privilege escalation to SYSTEM level.


How can this vulnerability impact me? :

If exploited, this vulnerability allows a local attacker with write access to escalate their privileges to SYSTEM level, which is the highest level of privilege on a Windows system. This can lead to full control over the affected system, including the ability to install programs, change configurations, access sensitive data, and disrupt system operations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart