Description

An Unquoted Search Path vulnerability has been identified in the utility for Moxa’s industrial computers (Windows). Due to the unquoted path configuration in the SerialInterfaceService.exe utility, a local attacker with limited privileges could place a malicious executable in a higher-priority directory within the search path. When the Serial Interface service starts, the malicious executable could be run with SYSTEM privileges. Successful exploitation could allow privilege escalation or enable an attacker to maintain persistence on the affected system. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality, integrity, or availability within any subsequent systems.

INFO

Published Date :

2025-08-25T08:01:11.035Z

Last Modified :

2025-08-25T13:48:09.418Z

Source :

Moxa
AFFECTED PRODUCTS

The following products are affected by CVE-2025-5191 vulnerability.

Vendors Products
Microsoft
  • Windows
Moxa
  • Drp-a100
  • Drp-c100
  • Serial Interface Service
  • Utility For Moxa Industrial Computers
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-5191.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability