Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66461: Unquoted search path or element in GS Yuasa International Ltd. FULLBACK Manager Pro (for Windows)

0
Medium
VulnerabilityCVE-2025-66461cvecve-2025-66461
Published: Mon Dec 08 2025 (12/08/2025, 09:31:44 UTC)
Source: CVE Database V5
Vendor/Project: GS Yuasa International Ltd.
Product: FULLBACK Manager Pro (for Windows)

Description

FULLBACK Manager Pro provided by GS Yuasa International Ltd. registers two Windows services with unquoted file paths. A user may execute arbitrary code with SYSTEM privilege if he/she has the write permission on the path to the directory where the affected product is installed.

AI-Powered Analysis

AILast updated: 12/08/2025, 10:00:50 UTC

Technical Analysis

CVE-2025-66461 is a security vulnerability identified in GS Yuasa International Ltd.'s FULLBACK Manager Pro software for Windows, specifically versions 4.00 and earlier. The vulnerability stems from the registration of two Windows services with unquoted file paths. In Windows, when service executable paths contain spaces and are not enclosed in quotes, the system may misinterpret the path and execute malicious binaries placed in higher-level directories. This condition is known as an unquoted search path or unquoted service path vulnerability. An attacker who has write permissions on any directory in the path leading to the service executable can place a malicious executable that will be run with SYSTEM privileges when the service starts or restarts. This effectively allows privilege escalation from a user with write access to full system control. The CVSS v3.0 score of 6.7 reflects a medium severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits have been reported yet, but the vulnerability represents a significant risk in environments where users have write access to installation directories. The lack of patches or updates linked in the report suggests that mitigation relies on restricting directory permissions or applying vendor fixes once available.

Potential Impact

For European organizations, this vulnerability poses a risk of local privilege escalation, potentially allowing attackers with limited access to gain full SYSTEM privileges. This can lead to unauthorized data access, system manipulation, or disruption of critical services. Organizations in manufacturing, industrial control, or sectors relying on GS Yuasa's FULLBACK Manager Pro may face operational disruptions or data breaches. The impact is particularly severe in environments where multiple users have write access to software installation directories, such as shared workstations or poorly managed endpoints. Given the high impact on confidentiality, integrity, and availability, exploitation could facilitate lateral movement, persistence, or deployment of ransomware. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often target unquoted service path vulnerabilities due to their straightforward exploitation. European entities with strict regulatory requirements around data protection and operational continuity must address this vulnerability promptly to avoid compliance violations and reputational damage.

Mitigation Recommendations

European organizations should immediately audit the file system permissions of directories where FULLBACK Manager Pro is installed to ensure that only trusted administrators have write access. Removing write permissions for non-administrative users on these directories will prevent exploitation. Additionally, organizations should monitor for the release of official patches or updates from GS Yuasa International Ltd. and apply them promptly. As a temporary workaround, administrators can manually quote the service executable paths in the Windows service configuration using tools like 'sc config' or PowerShell to prevent path hijacking. Employing application whitelisting and endpoint protection solutions that detect unauthorized service modifications or suspicious executable placements can further reduce risk. Regularly reviewing and hardening local privilege assignments and employing the principle of least privilege will limit the potential for exploitation. Finally, educating IT staff about the risks of unquoted service paths and ensuring secure software installation practices will help prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2025-12-02T01:22:39.267Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69369e58b488c525a1d75c5e

Added to database: 12/8/2025, 9:46:00 AM

Last enriched: 12/8/2025, 10:00:50 AM

Last updated: 12/11/2025, 12:30:05 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats