Summary
A privilege escalation vulnerability exists in Phoenix Contact Device and Update Management prior to version 2025.3.1 due to misconfigured permissions on nssm.exe in the DAUM-WINDOWS-SERVICE. This misconfiguration allows a low-privileged local user to execute arbitrary code with administrative privileges.
Impact
The products installer allows privileges escalation to admin rights caused by the nssm.exe. Nssm.exe is an open-source tool designed to simplify the management of Windows services.
The permissions on the nssm.exe were not secured properly, this could allow an attack to escalate privileges from a low privileged user to an administrator.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
1542953 | DaUM <2025.3.1 | DaUM <2025.3.1 |
Vulnerabilities
Expand / Collapse allA low-privileged local attacker can exploit improper permissions on nssm.exe to escalate their privileges and gain administrative access.
Remediation
Update to the latest 2025.3.1 DaUM Version.
Revision History
Version | Date | Summary |
---|---|---|
1 | 12.08.2025 12:00 | Initial |