Local privilege escalation in Genetec Update Service. An authenticated, low-privileged, Windows user could exploit this vulnerability to gain elevated privileges on the affected system.
References
| Link | Resource |
|---|---|
| https://techdocs.genetec.com/r/en-US/Security-Updates-for-GenetecTM-Update-Service-2.10/Resolved-vulnerabilities-in-Genetec-Update-Service-2.10 | Issue Tracking Vendor Advisory |
Configurations
History
26 Feb 2026, 17:54
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:a:genetec:genetec_update_service:*:*:*:*:*:*:*:* | |
| First Time |
Genetec
Genetec genetec Update Service |
|
| References | () https://techdocs.genetec.com/r/en-US/Security-Updates-for-GenetecTM-Update-Service-2.10/Resolved-vulnerabilities-in-Genetec-Update-Service-2.10 - Issue Tracking, Vendor Advisory |
24 Feb 2026, 20:27
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-24 20:27
Updated : 2026-02-26 17:54
NVD link : CVE-2025-1789
Mitre link : CVE-2025-1789
CVE.ORG link : CVE-2025-1789
JSON object : View
Products Affected
genetec
- genetec_update_service
CWE
CWE-276
Incorrect Default Permissions
