CVE-2019-25245
Privilege Escalation in Ross Video DashBoard via Executable Modification
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ross_video | dashboard | 8.5.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-732 | The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2019-25245 is an elevation of privileges vulnerability in Ross Video DashBoard version 8.5.1. It occurs because the DashBoard.exe executable file has improper file permissions that grant the 'Authenticated Users' group 'Modify' or 'Change' rights. This allows any authenticated user to replace the legitimate executable with a malicious one, enabling them to execute arbitrary code with elevated privileges on the affected system. [1, 3]
How can this vulnerability impact me? :
This vulnerability can allow an authenticated local attacker to escalate their privileges by replacing the DashBoard.exe executable with a malicious binary. This can lead to arbitrary code execution with elevated rights, potentially compromising the entire system where Ross Video DashBoard 8.5.1 is installed. [1, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the file permissions of the DashBoard.exe executable on the affected system. On Windows platforms, you can use the command-line tools icacls or cacls to inspect the access control lists (ACLs) of the DashBoard.exe file. Specifically, look for 'Authenticated Users' having 'Modify' (M) or 'Change' (C) permissions, which indicate the vulnerability. Example command: icacls "C:\Path\To\DashBoard.exe" [1, 3]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately restrict the permissions on the DashBoard.exe executable to remove 'Modify' or 'Change' rights from the 'Authenticated Users' group. Ensure that only trusted administrative accounts have write or modify permissions to this file. This prevents authenticated users from replacing the executable with a malicious binary and thus stops privilege escalation via this vector. [1, 3]