memoQ 10.1.13.ef1b2b52aae and earlier contains an unquoted service path vulnerability in the memoQ Auto Update Service (memoQauhlp101). The affected service is installed with a path containing spaces and without surrounding quotes. This misconfiguration allows local users to escalate privileges to SYSTEM by placing a malicious executable at C:\Program.exe.
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 30 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-428 | |
| Metrics | cvssV3_1 
 
 | 
Thu, 30 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Memoq Memoq memoq | |
| Vendors & Products | Memoq Memoq memoq | 
Wed, 29 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | memoQ 10.1.13.ef1b2b52aae and earlier contains an unquoted service path vulnerability in the memoQ Auto Update Service (memoQauhlp101). The affected service is installed with a path containing spaces and without surrounding quotes. This misconfiguration allows local users to escalate privileges to SYSTEM by placing a malicious executable at C:\Program.exe. | |
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published: 2025-10-29T00:00:00.000Z
Updated: 2025-10-30T14:40:19.867Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60320
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-30T14:40:07.163Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-10-29T20:15:36.670
Modified: 2025-10-30T15:15:40.963
Link: CVE-2025-60320
 Redhat
                        Redhat
                    No data.
 ReportizFlow
ReportizFlow