An attacker can exploit the update behavior of the WorkTime monitoring daemon to elevate privileges on the local system to NT Authority\SYSTEM. A malicious executable must be named  WTWatch.exe and dropped in the C:\ProgramData\wta\ClientExe directory, which is writable by "Everyone". The executable will then be run by the WorkTime monitoring daemon.
Advisories

No advisories yet.

Fixes

Solution

The vendor did not respond to our communication attempts anymore. It is currently as of February 2026 unclear, whether a patch is available. Please contact the vendor to request a patch for the identified critical security issues.


Workaround

No workaround given by the vendor.

References
History

Thu, 19 Feb 2026 11:15:00 +0000

Type Values Removed Values Added
Description An attacker can exploit the update behavior of the WorkTime monitoring daemon to elevate privileges on the local system to NT Authority\SYSTEM. A malicious executable must be named  WTWatch.exe and dropped in the C:\ProgramData\wta\ClientExe directory, which is writable by "Everyone". The executable will then be run by the WorkTime monitoring daemon.
Title Local Privilege Escalation in NesterSoft WorkTime
Weaknesses CWE-269
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-02-19T10:53:18.501Z

Reserved: 2026-02-04T07:44:34.747Z

Link: CVE-2025-15561

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-19T11:15:56.727

Modified: 2026-02-19T11:15:56.727

Link: CVE-2025-15561

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses