Skip to main content

CVE-2025-46355: Incorrect default permissions in Keiyo System Co., LTD PC Time Tracer

High
VulnerabilityCVE-2025-46355cvecve-2025-46355
Published: Tue Jun 03 2025 (06/03/2025, 08:09:47 UTC)
Source: CVE Database V5
Vendor/Project: Keiyo System Co., LTD
Product: PC Time Tracer

Description

Incorrect default permissions issue in PC Time Tracer prior to 5.2. If exploited, arbitrary code may be executed with SYSTEM privilege on Windows system where the product is running by a local authenticated attacker.

AI-Powered Analysis

AILast updated: 07/11/2025, 07:04:01 UTC

Technical Analysis

CVE-2025-46355 is a vulnerability identified in the PC Time Tracer software developed by Keiyo System Co., LTD, affecting versions prior to 5.2. The core issue stems from incorrect default permissions configured within the software, which can be exploited by a local authenticated attacker to execute arbitrary code with SYSTEM privileges on a Windows system. This vulnerability is significant because SYSTEM privileges represent the highest level of access on a Windows operating system, allowing an attacker to fully control the affected machine, including installing programs, modifying system configurations, and accessing sensitive data. The vulnerability requires local authentication, meaning the attacker must have some level of access to the system, but no additional privilege escalation is needed beyond exploiting the permission misconfiguration. The CVSS v3.0 score of 7.3 reflects a high severity level, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), low privileges required (PR:L), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). There are no known exploits in the wild at the time of publication, and no patches or mitigations have been explicitly linked in the provided data. The vulnerability was published on June 3, 2025, with the initial reservation date on May 28, 2025. The issue is critical for environments where PC Time Tracer is deployed, particularly in enterprise or organizational settings where multiple users have local access to Windows systems running this software. Exploitation could lead to full system compromise, data breaches, and disruption of business operations.

Potential Impact

For European organizations, the impact of CVE-2025-46355 can be substantial, especially in sectors relying on PC Time Tracer for time tracking and workforce management. The ability for a local authenticated attacker to gain SYSTEM-level access can lead to unauthorized data access, manipulation, or deletion, potentially violating GDPR requirements for data protection and privacy. This could result in regulatory penalties, reputational damage, and operational disruptions. Additionally, compromised systems could be used as footholds for lateral movement within corporate networks, increasing the risk of broader cyberattacks such as ransomware or espionage. Organizations with distributed workforces or those that allow multiple users local access to machines running PC Time Tracer are particularly vulnerable. The requirement for user interaction and local authentication somewhat limits remote exploitation but does not eliminate risk, especially in environments with weak access controls or shared workstations. The high impact on confidentiality, integrity, and availability underscores the critical nature of this vulnerability in maintaining secure and reliable IT operations.

Mitigation Recommendations

To mitigate CVE-2025-46355, European organizations should prioritize the following actions: 1) Immediately upgrade PC Time Tracer to version 5.2 or later, where the incorrect default permissions issue is resolved. 2) Conduct an audit of user permissions on systems running PC Time Tracer to ensure that only authorized personnel have local access and that permissions are appropriately restricted. 3) Implement strict access control policies, including the use of least privilege principles and multi-factor authentication for local logins where feasible. 4) Monitor systems for unusual activity indicative of privilege escalation attempts, such as unexpected process executions or changes in system configurations. 5) Employ endpoint detection and response (EDR) tools to detect and block attempts to exploit this vulnerability. 6) Educate users about the risks of local privilege escalation vulnerabilities and the importance of not executing untrusted code or scripts. 7) If patching is delayed, consider isolating affected systems or limiting local user access to minimize exposure. 8) Regularly review and update security policies to incorporate lessons learned from this vulnerability and similar incidents.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-05-28T02:51:59.281Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 683ee1eb182aa0cae2739646

Added to database: 6/3/2025, 11:52:11 AM

Last enriched: 7/11/2025, 7:04:01 AM

Last updated: 8/11/2025, 6:37:28 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats