Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1790: Execution with Unnecessary Privileges in Genetec Inc. Genetec Sipelia

0
Medium
VulnerabilityCVE-2025-1790cvecve-2025-1790
Published: Fri Feb 13 2026 (02/13/2026, 16:45:06 UTC)
Source: CVE Database V5
Vendor/Project: Genetec Inc.
Product: Genetec Sipelia

Description

Local privilege escalation in Genetec Sipelia Plugin. An authenticated low-privileged Windows user could exploit this vulnerability to gain elevated privileges on the affected system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/20/2026, 22:45:34 UTC

Technical Analysis

CVE-2025-1790 is a local privilege escalation vulnerability identified in the Genetec Sipelia Plugin, a component of Genetec's security and communication platform. The vulnerability affects versions earlier than 2.14.271 and allows an authenticated Windows user with low privileges to escalate their privileges to a higher level on the affected system. The root cause is the execution of certain processes or components with unnecessary elevated privileges, which can be exploited by a low-privileged user to gain unauthorized administrative or system-level access. This flaw does not require user interaction beyond authentication, making it a significant risk once an attacker has local access. The CVSS 4.0 base score is 5.8, reflecting medium severity, with high impact on confidentiality, integrity, and availability. The vulnerability is local and requires authentication, limiting remote exploitation but increasing risk in environments where low-privileged users have access. No public exploits or active exploitation have been reported yet. The vulnerability was reserved in early 2025 and published in February 2026, indicating recent discovery and disclosure. Genetec Sipelia is widely used in physical security management, including video surveillance and communication systems, making this vulnerability relevant to organizations relying on these systems for critical security operations.

Potential Impact

If exploited, this vulnerability allows an authenticated low-privileged user to elevate their privileges, potentially gaining administrative or system-level access. This can lead to unauthorized access to sensitive security configurations, manipulation or disabling of surveillance and communication functions, and lateral movement within the network. The compromise of Genetec Sipelia systems could undermine physical security controls, leading to broader organizational security risks including data breaches, sabotage, or disruption of critical security services. Organizations relying on Genetec Sipelia for security operations, especially in sectors like government, transportation, critical infrastructure, and large enterprises, face increased risk of operational disruption and loss of trust. Although exploitation requires local access and authentication, insider threats or attackers who have gained initial footholds could leverage this vulnerability to escalate privileges and deepen their control over the environment.

Mitigation Recommendations

1. Apply the official patch or upgrade Genetec Sipelia to version 2.14.271 or later as soon as it becomes available from Genetec. 2. Restrict local access to systems running Genetec Sipelia to trusted users only, minimizing the number of accounts with low privileges that can log in locally. 3. Implement strict user account management and monitoring to detect unusual privilege escalation attempts or unauthorized access. 4. Use application whitelisting and endpoint protection solutions to monitor and control execution of processes with elevated privileges. 5. Employ network segmentation to isolate Genetec Sipelia servers from general user workstations and limit lateral movement opportunities. 6. Conduct regular audits of user privileges and system logs to identify suspicious activities related to privilege escalation. 7. Educate administrators and security teams about this vulnerability and ensure incident response plans include scenarios involving local privilege escalation in security management platforms.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Genetec
Date Reserved
2025-02-28T17:07:17.135Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698f5d11c9e1ff5ad84e392b

Added to database: 2/13/2026, 5:19:13 PM

Last enriched: 2/20/2026, 10:45:34 PM

Last updated: 3/30/2026, 9:14:03 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses