CVE-2025-66461

6.7 MEDIUM

📋 TL;DR

CVE-2025-66461 is an unquoted service path vulnerability in GS Yuasa's FULLBACK Manager Pro software that allows local users with write permissions to the installation directory to execute arbitrary code with SYSTEM privileges. This affects organizations using the vulnerable FULLBACK Manager Pro software on Windows systems. Attackers could escalate privileges from a lower-privileged account to full system control.

💻 Affected Systems

Products:
  • FULLBACK Manager Pro
Versions: All versions prior to the fix
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access and write permissions to the installation directory path.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Privilege escalation from a standard user account to SYSTEM, allowing attackers to bypass security controls and maintain persistence on compromised systems.

🟢

If Mitigated

Limited impact if proper access controls restrict write permissions to installation directories and least privilege principles are enforced.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and write permissions to the installation directory. The technique is well-known and easily weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version with fix applied (check vendor advisory)

Vendor Advisory: https://ps.gs-yuasa.com/technicalinfo/pdf/failure/FMP_info20251201_TEX48214-993.pdf

Restart Required: Yes

Instructions:

1. Download the updated version from GS Yuasa's official website. 2. Install the update following vendor instructions. 3. Restart affected systems to ensure services use the corrected paths.

🔧 Temporary Workarounds

Add quotes to service paths

windows

Manually add quotes around the service executable paths in Windows Registry

sc config "ServiceName" binPath= "\"C:\Path\To\Executable.exe\"" arguments

Restrict directory permissions

windows

Remove write permissions for non-administrative users from the installation directory and parent directories

icacls "C:\Program Files\FULLBACK Manager Pro" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Implement strict access controls to prevent non-administrative users from writing to the installation directory and its parent paths.
  • Monitor for unauthorized service modifications and privilege escalation attempts using endpoint detection tools.

🔍 How to Verify

Check if Vulnerable:

Check Windows services for FULLBACK Manager Pro entries with unquoted paths containing spaces: sc qc "ServiceName" | findstr BINARY_PATH_NAME

Check Version:

Check the software version in the application interface or via the vendor's version verification tool.

Verify Fix Applied:

Verify service paths are quoted and check that no unauthorized executables exist in installation directory parent paths.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing service path modifications (Event ID 7040)
  • Unexpected service creation or modification events
  • Process creation from unusual locations in the installation directory path

Network Indicators:

  • Unusual outbound connections from SYSTEM-level processes
  • Lateral movement attempts from previously compromised systems

SIEM Query:

EventID=7040 AND (ServiceName="*FULLBACK*" OR ServiceName contains "Manager") OR ProcessCreation WHERE ParentImage LIKE "%services.exe%" AND CommandLine CONTAINS "C:\\Program Files\\FULLBACK"

🔗 References

📤 Share & Export