Impact
An uncontrolled search path vulnerability exists in the msimg32.dll component of Mobatek MobaXterm Home Edition. If an attacker can run code locally, they can influence the operating system's DLL resolution and load a malicious library in place of the legitimate one, allowing execution of arbitrary code with the rights of the MobaXterm user, potentially leading to privilege escalation or broader system compromise.
Affected Systems
Mobatek’s MobaXterm Home Edition up to version 26.1 is affected. The bundled msimg32.dll contains the flaw; installing the vendor’s fixed release, version 26.2, removes the vulnerability.
Risk and Exploitability
With a CVSS score of 7.3, the issue is considered high severity. The exploit has been publicly disclosed but requires local execution and a high complexity attack. Because EPSS data is unavailable and the vulnerability is not included in the KEV catalog, the likelihood of exploitation remains uncertain, yet the potential impact is significant. The prompt release of an updated version limits exposure for those who update quickly.
OpenCVE Enrichment