Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.8
Genetec Update Service: Privilege Escalation Risk on Windows Systems
CVE-2025-1789
Summary
A Genetec Update Service vulnerability on Windows systems allows an authenticated, low-privileged user to gain elevated permissions on the affected system. This could potentially allow the user to access sensitive data or make unauthorized changes. To mitigate this risk, update the Genetec Update Service to the latest version and ensure all users follow best practices for account security and access control.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| genetec | genetec_update_service | <= 2.10.6 | – |
Original title
Local privilege escalation in Genetec Update Service. An authenticated, low-privileged, Windows user could exploit this vulnerability to gain elevated privileges on the affected system.
Original description
Local privilege escalation in Genetec Update Service. An authenticated, low-privileged, Windows user could exploit this vulnerability to gain elevated privileges on the affected system.
nvd CVSS3.1
7.8
nvd CVSS4.0
5.8
Vulnerability type
CWE-276
Incorrect Default Permissions
- https://techdocs.genetec.com/r/en-US/Security-Updates-for-GenetecTM-Update-Servi... Issue Tracking Vendor Advisory
Published: 24 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026