Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x9r8-77rv-89rp

Опубликовано: 25 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 7.3

Описание

An Unquoted Search Path vulnerability has been identified in the utility for Moxa’s industrial computers (Windows). Due to the unquoted path configuration in the SerialInterfaceService.exe utility, a local attacker with limited privileges could place a malicious executable in a higher-priority directory within the search path. When the Serial Interface service starts, the malicious executable could be run with SYSTEM privileges. Successful exploitation could allow privilege escalation or enable an attacker to maintain persistence on the affected system. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality, integrity, or availability within any subsequent systems.

An Unquoted Search Path vulnerability has been identified in the utility for Moxa’s industrial computers (Windows). Due to the unquoted path configuration in the SerialInterfaceService.exe utility, a local attacker with limited privileges could place a malicious executable in a higher-priority directory within the search path. When the Serial Interface service starts, the malicious executable could be run with SYSTEM privileges. Successful exploitation could allow privilege escalation or enable an attacker to maintain persistence on the affected system. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality, integrity, or availability within any subsequent systems.

EPSS

Процентиль: 3%
0.00017
Низкий

7.3 High

CVSS4

Дефекты

CWE-428

Связанные уязвимости

nvd
6 месяцев назад

An Unquoted Search Path vulnerability has been identified in the utility for Moxa’s industrial computers (Windows). Due to the unquoted path configuration in the SerialInterfaceService.exe utility, a local attacker with limited privileges could place a malicious executable in a higher-priority directory within the search path. When the Serial Interface service starts, the malicious executable could be run with SYSTEM privileges. Successful exploitation could allow privilege escalation or enable an attacker to maintain persistence on the affected system. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality, integrity, or availability within any subsequent systems.

CVSS3: 7.8
fstec
6 месяцев назад

Уязвимость утилиты SerialInterfaceService.exe промышленных компьютеров Moxa, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 3%
0.00017
Низкий

7.3 High

CVSS4

Дефекты

CWE-428