CVE-2025-10541

7.8 HIGH

📋 TL;DR

This vulnerability allows local users to escalate privileges to SYSTEM level by placing malicious files in an insecure directory. Any local user on systems running iMonitor EAM 9.6394 can exploit this to gain full system control. The service automatically executes files from a directory with weak permissions during startup.

💻 Affected Systems

Products:
  • iMonitor EAM
Versions: 9.6394
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable service eamusbsrv64.exe runs automatically with SYSTEM privileges by default. The C:\sysupdate\ directory is created with weak permissions during installation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing attackers to install persistent malware, steal credentials, disable security controls, and control the entire system.

🟠

Likely Case

Local privilege escalation from any user account to SYSTEM, enabling installation of backdoors, credential dumping, and lateral movement within the network.

🟢

If Mitigated

Limited impact if proper access controls are implemented on the C:\sysupdate\ directory and service restart is controlled.

🌐 Internet-Facing: LOW - This requires local access to the system, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Any local user (including low-privileged accounts) can exploit this to gain SYSTEM privileges on affected systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local user access but no special privileges. The attack involves simple file operations and service restart. Public disclosure includes technical details sufficient for weaponization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-imonitorsoft-eam/

Restart Required: Yes

Instructions:

1. Check vendor website for updated version. 2. Uninstall current version. 3. Install patched version if available. 4. Restart system to ensure vulnerable service is replaced.

🔧 Temporary Workarounds

Restrict directory permissions

windows

Remove write permissions for non-administrative users on the vulnerable directory

icacls C:\sysupdate\ /inheritance:r
icacls C:\sysupdate\ /grant Administrators:(OI)(CI)F
icacls C:\sysupdate\ /deny Users:(OI)(CI)W

Disable vulnerable service

windows

Prevent the eamusbsrv64.exe service from running automatically

sc config eamusbsrv64 start= disabled
sc stop eamusbsrv64

🧯 If You Can't Patch

  • Monitor the C:\sysupdate\ directory for unauthorized file creation using file integrity monitoring
  • Implement strict access controls and audit all local user activities on affected systems

🔍 How to Verify

Check if Vulnerable:

Check if C:\sysupdate\ directory exists and has weak permissions: icacls C:\sysupdate\

Check Version:

Check installed programs in Control Panel or run: wmic product where name="iMonitor EAM" get version

Verify Fix Applied:

Verify directory permissions restrict write access to non-administrators and service is disabled or removed

📡 Detection & Monitoring

Log Indicators:

  • File creation events in C:\sysupdate\ directory
  • Service control events for eamusbsrv64.exe
  • Process creation events for files from C:\sysupdate\

Network Indicators:

  • Unusual outbound connections from SYSTEM-level processes following service restart

SIEM Query:

EventID=4663 OR EventID=4688 AND (TargetObject="C:\\sysupdate\\*" OR NewProcessName="C:\\sysupdate\\*")

🔗 References

📤 Share & Export