CVE-2025-15561

An attacker can exploit the update behavior of the WorkTime monitoring daemon to elevate privileges on the local system to NT Authority\SYSTEM. A malicious executable must be named  WTWatch.exe and dropped in the C:\ProgramData\wta\ClientExe directory, which is writable by "Everyone". The executable will then be run by the WorkTime monitoring daemon.
References
Link Resource
https://r.sec-consult.com/worktime Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nestersoft:worktime:*:*:*:*:cloud:*:*:*
cpe:2.3:a:nestersoft:worktime:*:*:*:*:on-premise:*:*:*

History

26 Feb 2026, 02:58

Type Values Removed Values Added
CPE cpe:2.3:a:nestersoft:worktime:*:*:*:*:on-premise:*:*:*
cpe:2.3:a:nestersoft:worktime:*:*:*:*:cloud:*:*:*
CWE NVD-CWE-noinfo
First Time Nestersoft
Nestersoft worktime
Summary
  • (es) Un atacante puede explotar el comportamiento de actualización del demonio de monitoreo WorkTime para elevar privilegios en el sistema local a NT Authority\SYSTEM. Un ejecutable malicioso debe llamarse WTWatch.exe y ser colocado en el directorio C:\ProgramData\wta\ClientExe, que es escribible por 'Todos'. El ejecutable será entonces ejecutado por el demonio de monitoreo WorkTime.
References () https://r.sec-consult.com/worktime - () https://r.sec-consult.com/worktime - Third Party Advisory

23 Feb 2026, 19:22

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

19 Feb 2026, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-19 11:15

Updated : 2026-02-26 02:58


NVD link : CVE-2025-15561

Mitre link : CVE-2025-15561

CVE.ORG link : CVE-2025-15561


JSON object : View

Products Affected

nestersoft

  • worktime
CWE
CWE-269

Improper Privilege Management

NVD-CWE-noinfo