CVE-2025-5191

HIGH

Moxa's industrial computers - Privilege Escalation

Title source: llm
STIX 2.1

Description

An Unquoted Search Path vulnerability has been identified in the utility for Moxa’s industrial computers (Windows). Due to the unquoted path configuration in the SerialInterfaceService.exe utility, a local attacker with limited privileges could place a malicious executable in a higher-priority directory within the search path. When the Serial Interface service starts, the malicious executable could be run with SYSTEM privileges. Successful exploitation could allow privilege escalation or enable an attacker to maintain persistence on the affected system. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality, integrity, or availability within any subsequent systems.

Scores

CVSS v4 7.3
EPSS 0.0002
EPSS Percentile 5.5%
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-428
Status published
Products (8)
Moxa/Utility for DRP-A100 Series 1.0
Moxa/Utility for DRP-A100 Series 1.0 - 1.1
Moxa/Utility for DRP-A100 Series 1.1
Moxa/Utility for DRP-A100 Series 1.2
Moxa/Utility for DRP-C100 Series 1.0
Moxa/Utility for DRP-C100 Series 1.0 - 1.1
Moxa/Utility for DRP-C100 Series 1.1
Moxa/Utility for DRP-C100 Series 1.2
Published Aug 25, 2025
Tracked Since Feb 18, 2026