Moxa CVE-2025-5191: Unquoted Search Path Vulnerability in the Utility for Industrial Computers (Windows)
An unquoted search path vulnerability exists in SerialInterfaceService.exe, a component of the Moxa utility for industrial computers (Windows). A local attacker with limited user privileges could place a malicious executable in a higher-priority directory within the Windows search path. When the Serial Interface service starts, the malicious executable would execute with SYSTEM privileges, enabling privilege escalation or persistence. The vulnerability affects the confidentiality, integrity, and availability of the affected device but does not directly propagate to downstream systems.
- Local user account on the Moxa industrial computer (limited privileges sufficient)
- Write access to a directory in the Windows search path (e.g., C:\Windows, Program Files, or a path earlier in the search order)
- Ability to restart the SerialInterfaceService service or wait for system reboot
- No credentials needed beyond local user login
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c7d81f2f-c491-4418-8c10-f62ab91a06c2Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.