Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64151: Unquoted search path or element in Roboticsware PTE. LTD. FA-Panel6

0
Medium
VulnerabilityCVE-2025-64151cvecve-2025-64151
Published: Wed Nov 05 2025 (11/05/2025, 06:19:25 UTC)
Source: CVE Database V5
Vendor/Project: Roboticsware PTE. LTD.
Product: FA-Panel6

Description

Multiple Roboticsware products provided by Roboticsware PTE. LTD. register Windows services with unquoted file paths. A user with the write permission on the root directory of the system drive may execute arbitrary code with SYSTEM privilege.

AI-Powered Analysis

AILast updated: 11/12/2025, 08:04:30 UTC

Technical Analysis

CVE-2025-64151 is a vulnerability identified in Roboticsware PTE. LTD.'s FA-Panel6 product, versions Rev17 and earlier. The root cause is the registration of Windows services with unquoted file paths. In Windows, if a service executable path contains spaces and is not enclosed in quotes, the system may interpret the path incorrectly, allowing an attacker to place a malicious executable in a higher-priority path segment. Specifically, if a user has write permissions on the root directory of the system drive (commonly C:\), they can place a malicious executable that the service will execute with SYSTEM privileges during service startup or restart. This leads to privilege escalation from a user with write access to SYSTEM-level code execution. The vulnerability requires the attacker to have write permissions on the root of the system drive, which is a high privilege but can be possible in misconfigured environments or through other chained exploits. The CVSS 3.0 score of 6.7 reflects the medium severity, with high impact on confidentiality, integrity, and availability (all rated high), low attack vector (local), low attack complexity, and requiring high privileges but no user interaction. No known exploits have been reported in the wild yet. The vulnerability affects critical industrial automation software, which may be deployed in manufacturing and process control environments. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for interim mitigations.

Potential Impact

For European organizations, especially those in manufacturing, industrial automation, and critical infrastructure sectors using Roboticsware's FA-Panel6, this vulnerability poses a significant risk. Exploitation can lead to full SYSTEM-level compromise, allowing attackers to manipulate control systems, disrupt operations, steal sensitive data, or cause safety hazards. Given the high impact on confidentiality, integrity, and availability, successful exploitation could result in operational downtime, financial losses, regulatory penalties, and damage to reputation. The requirement for write access to the system drive root limits the attack surface but does not eliminate risk, particularly in environments with insufficient access controls or insider threats. Additionally, the vulnerability could be leveraged as part of a multi-stage attack chain to escalate privileges after initial access. The absence of known exploits reduces immediate risk but should not lead to complacency. European organizations must assess their exposure, especially those with Roboticsware deployments in critical sectors.

Mitigation Recommendations

1. Immediately audit and restrict write permissions on the root directory of the system drive (e.g., C:\) to prevent unauthorized users from placing executables there. 2. If possible, upgrade Roboticsware FA-Panel6 to a version later than Rev17 once patches are released. 3. As an interim measure, manually inspect and correct service registrations to ensure all executable paths are properly quoted. This can be done using tools like 'sc qc' or registry inspection under HKLM\SYSTEM\CurrentControlSet\Services. 4. Implement application whitelisting to prevent unauthorized executables from running, especially from the system drive root. 5. Monitor system logs and service start events for unusual behavior or unauthorized service modifications. 6. Employ endpoint detection and response (EDR) solutions to detect suspicious activity related to service execution or privilege escalation attempts. 7. Educate system administrators about the risks of misconfigured permissions and unquoted service paths. 8. Limit administrative privileges and enforce the principle of least privilege to reduce the likelihood of an attacker gaining write access to critical directories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2025-10-28T07:50:55.961Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 690aee14063e7c5f011b5840

Added to database: 11/5/2025, 6:26:28 AM

Last enriched: 11/12/2025, 8:04:30 AM

Last updated: 12/19/2025, 11:28:13 PM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats