CVE-2025-15561
EUVD-2025-20763619.02.2026, 11:15
An attacker can exploit the update behavior of the WorkTime monitoring daemon to elevate privileges on the local system to NT Authority\SYSTEM. A malicious executable must be named WTWatch.exe and dropped in the C:\ProgramData\wta\ClientExe directory, which is writable by "Everyone". The executable will then be run by the WorkTime monitoring daemon.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| nestersoft | worktime | 𝑥 ≤ 11.8.8 |
| nestersoft | worktime | 𝑥 ≤ 11.8.8 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References