CVE-2025-15561
An attacker can exploit the update behavior of the WorkTime monitoring daemon to elevate privileges on the local system to NT Authority\SYSTEM. A malicious executable must be named WTWatch.exe and dropped in the C:\ProgramData\wta\ClientExe directory, which is writable by "Everyone". The executable will then be run by the WorkTime monitoring daemon.
Vendor
Product
CWE
Yayın Tarihi
2026-02-19 11:15:56
Güncelleme
2026-02-26 02:58:45
Source Identifier
551230f0-3615-47bd-b7cc-93e92e730bbf
KEV Date Added
-