7 CVE-2025-9016
A vulnerability was identified in Mechrevo Control Center GX V2 5.56.51.48. This affects an unknown part of the file C:Program FilesOEMæºæ¢°é©å½æ§å¶ä¸å¿AiStoneServiceMyControlCenterCommand of the component Powershell Script Handler. The manipulation leads to uncontrolled search path. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used.
https://nvd.nist.gov/vuln/detail/CVE-2025-9016
Categories
CWE-426 : Untrusted Search Path
References
134c704f-9b21-4f2e-91b3-4a467353bcc0
| https://vuldb.com/?submit.624900 Third Party Advisory VDB Entry |
cna@vuldb.com
| https://drive.proton.me/urls/7QYSEW6734#H3N4fQ3mw6gX Broken Link |
| https://vuldb.com/?ctiid.320067 Permissions Required VDB Entry |
| https://vuldb.com/?id.320067 Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.624900 Third Party Advisory VDB Entry |
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:a:mechrevo:control_center_gx_v2:5.56.51.48:*:*:*:*:*:*:* | ||
REMEDIATION
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
| Url |
|---|
| No known exploits |
Other Nist (github, ...)
| Url |
|---|
| No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| 38 | Leveraging/Manipulating Configuration File Search Paths |
Very High |
MITRE
Techniques
| id | description |
|---|---|
| T1574.007 | Hijack Execution Flow:Path Interception by PATH Environment Variable |
| T1574.009 | Hijack Execution Flow: Path Interception by Unquoted Path |
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. | |
Mitigations
| id | description |
|---|---|
| M1022 | Ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory <code>C:</code> and system directories, such as <code>C:Windows</code>, to reduce places where malicious files could be placed for execution. Require that all executables be placed in write-protected directories. |
| M1022 | Ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory <code>C:</code> and system directories, such as <code>C:Windows</code>, to reduce places where malicious files could be placed for execution. Require that all executables be placed in write-protected directories. |
| © 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation. | |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
