CVE-2025-46355

7.3 HIGH

📋 TL;DR

CVE-2025-46355 is an incorrect default permissions vulnerability in PC Time Tracer that allows local authenticated attackers to execute arbitrary code with SYSTEM privileges. This affects Windows systems running vulnerable versions of PC Time Tracer, potentially giving attackers complete control over affected systems.

💻 Affected Systems

Products:
  • PC Time Tracer
Versions: Prior to 5.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access to the Windows system where PC Time Tracer is installed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM privilege compromise leading to complete system takeover, data theft, ransomware deployment, or lateral movement across the network.

🟠

Likely Case

Local privilege escalation allowing attackers to install malware, steal credentials, or maintain persistent access on compromised systems.

🟢

If Mitigated

Limited impact if proper access controls, least privilege principles, and network segmentation are implemented.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: HIGH with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access but the vulnerability itself appears straightforward to exploit once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.2

Vendor Advisory: https://www.keiyo-system.co.jp/archives/11305

Restart Required: Yes

Instructions:

1. Download PC Time Tracer version 5.2 or later from the vendor website. 2. Uninstall the vulnerable version. 3. Install version 5.2 or later. 4. Restart the system.

🔧 Temporary Workarounds

Remove vulnerable software

windows

Uninstall PC Time Tracer if not required for business operations

Control Panel > Programs > Uninstall a program > Select PC Time Tracer > Uninstall

Restrict local access

windows

Implement strict access controls to limit who can log into systems with PC Time Tracer installed

🧯 If You Can't Patch

  • Implement strict least privilege access controls and monitor for suspicious local privilege escalation attempts
  • Isolate affected systems using network segmentation and restrict lateral movement capabilities

🔍 How to Verify

Check if Vulnerable:

Check PC Time Tracer version in Control Panel > Programs > Programs and Features. If version is earlier than 5.2, the system is vulnerable.

Check Version:

wmic product where name="PC Time Tracer" get version

Verify Fix Applied:

Verify PC Time Tracer version is 5.2 or later in Control Panel > Programs > Programs and Features.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing unexpected SYSTEM privilege processes
  • Security logs showing privilege escalation attempts
  • Application logs showing PC Time Tracer service anomalies

Network Indicators:

  • Unusual outbound connections from systems with PC Time Tracer
  • Lateral movement attempts from affected systems

SIEM Query:

EventID=4688 AND NewProcessName CONTAINS "PC Time Tracer" AND SubjectUserName NOT IN ["SYSTEM", "LOCAL SERVICE", "NETWORK SERVICE"]

🔗 References

📤 Share & Export