No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 26 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Privilege Escalation via Unsecured Installation Folder in RATOC RAID Monitoring Manager for Windows |
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ratocsystems
Ratocsystems raid Monitoring Manager |
|
| Vendors & Products |
Ratocsystems
Ratocsystems raid Monitoring Manager |
Thu, 26 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The installer of RATOC RAID Monitoring Manager for Windows allows to customize the installation folder. If the installation folder is customized to some non-default one, the folder may be left with un-secure ACLs and non-administrative users can alter contents of that folder. It may allow a non-administrative user to execute an arbitrary code with SYSTEM privilege. | |
| Weaknesses | CWE-276 | |
| References |
| |
| Metrics |
cvssV3_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2026-03-26T14:13:14.348Z
Reserved: 2026-03-19T02:37:43.433Z
Link: CVE-2026-32680
No data.
Status : Received
Published: 2026-03-26T07:16:20.220
Modified: 2026-03-26T07:16:20.220
Link: CVE-2026-32680
No data.
OpenCVE Enrichment
Updated: 2026-03-26T12:08:18Z