An Unquoted Search Path vulnerability has been identified in the utility for Moxa’s industrial computers (Windows). Due to the unquoted path configuration in the SerialInterfaceService.exe utility, a local attacker with limited privileges could place a malicious executable in a higher-priority directory within the search path. When the Serial Interface service starts, the malicious executable could be run with SYSTEM privileges. Successful exploitation could allow privilege escalation or enable an attacker to maintain persistence on the affected system. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality, integrity, or availability within any subsequent systems.
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 25 Aug 2025 22:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Microsoft Microsoft windows Moxa Moxa drp-a100 Moxa drp-c100 Moxa serial Interface Service Moxa utility For Moxa Industrial Computers | |
| Vendors & Products | Microsoft Microsoft windows Moxa Moxa drp-a100 Moxa drp-c100 Moxa serial Interface Service Moxa utility For Moxa Industrial Computers | 
Mon, 25 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Mon, 25 Aug 2025 08:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | An Unquoted Search Path vulnerability has been identified in the utility for Moxa’s industrial computers (Windows). Due to the unquoted path configuration in the SerialInterfaceService.exe utility, a local attacker with limited privileges could place a malicious executable in a higher-priority directory within the search path. When the Serial Interface service starts, the malicious executable could be run with SYSTEM privileges. Successful exploitation could allow privilege escalation or enable an attacker to maintain persistence on the affected system. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality, integrity, or availability within any subsequent systems. | |
| Title | Unquoted Search Path Vulnerability in the Utility for Industrial Computers (Windows) | |
| Weaknesses | CWE-428 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2025-08-25T13:48:09.418Z
Reserved: 2025-05-26T05:18:48.345Z
Link: CVE-2025-5191
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-08-25T13:48:05.859Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-08-25T08:15:30.047
Modified: 2025-08-25T20:24:45.327
Link: CVE-2025-5191
 Redhat
                        Redhat
                    No data.