CVE-2019-25245
Unknown Unknown - Not Provided
Privilege Escalation in Ross Video DashBoard via Executable Modification

Publication date: 2025-12-24

Last updated on: 2025-12-24

Assigner: VulnCheck

Description
Ross Video DashBoard 8.5.1 contains an elevation of privileges vulnerability that allows authenticated users to modify executable files due to improper permission settings. Attackers can exploit the 'M' or 'C' flags for 'Authenticated Users' group to replace the DashBoard.exe binary with a malicious executable.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-24
Last Modified
2025-12-24
Generated
2026-05-07
AI Q&A
2025-12-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ross_video dashboard 8.5.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-732 The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2019-25245 is an elevation of privileges vulnerability in Ross Video DashBoard version 8.5.1. It occurs because the DashBoard.exe executable file has improper file permissions that grant the 'Authenticated Users' group 'Modify' or 'Change' rights. This allows any authenticated user to replace the legitimate executable with a malicious one, enabling them to execute arbitrary code with elevated privileges on the affected system. [1, 3]


How can this vulnerability impact me? :

This vulnerability can allow an authenticated local attacker to escalate their privileges by replacing the DashBoard.exe executable with a malicious binary. This can lead to arbitrary code execution with elevated rights, potentially compromising the entire system where Ross Video DashBoard 8.5.1 is installed. [1, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking the file permissions of the DashBoard.exe executable on the affected system. On Windows platforms, you can use the command-line tools icacls or cacls to inspect the access control lists (ACLs) of the DashBoard.exe file. Specifically, look for 'Authenticated Users' having 'Modify' (M) or 'Change' (C) permissions, which indicate the vulnerability. Example command: icacls "C:\Path\To\DashBoard.exe" [1, 3]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately restrict the permissions on the DashBoard.exe executable to remove 'Modify' or 'Change' rights from the 'Authenticated Users' group. Ensure that only trusted administrative accounts have write or modify permissions to this file. This prevents authenticated users from replacing the executable with a malicious binary and thus stops privilege escalation via this vector. [1, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart