CVE-2025-10941

7.8 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Topaz SERVCore Teller installer versions 2.14.0-RC2 and 2.14.1. The vulnerability allows attackers with local access to manipulate insecure directory permissions, potentially gaining elevated privileges. Only systems running the affected installer versions are impacted.

💻 Affected Systems

Products:
  • Topaz SERVCore Teller
Versions: 2.14.0-RC2, 2.14.1
Operating Systems: Windows (based on installer being .msi)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the installer component SERVCoreTeller_2.0.40D.msi, specifically related to insecure use of nssm (Non-Sucking Service Manager).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM/administrator privileges, enabling complete system compromise, data theft, persistence mechanisms, and lateral movement.

🟠

Likely Case

Local user escalates privileges to install malware, modify system configurations, or access restricted data and resources.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to the user's own permissions with no privilege escalation.

🌐 Internet-Facing: LOW - Attack requires local access, cannot be exploited remotely.
🏢 Internal Only: HIGH - Local attackers (including malicious insiders or compromised accounts) can exploit this to gain elevated privileges on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Attack requires local access and manipulation of directory permissions. The vulnerability involves insecure permissions that allow privilege escalation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest published version (after 2.14.1)

Vendor Advisory: Not provided in CVE details

Restart Required: Yes

Instructions:

1. Uninstall affected versions (2.14.0-RC2/2.14.1). 2. Download latest version from vendor. 3. Install updated version. 4. Restart system to ensure clean state.

🔧 Temporary Workarounds

Remove vulnerable installer

windows

Uninstall the affected SERVCore Teller versions to eliminate the vulnerable component

Control Panel > Programs > Uninstall a program > Select Topaz SERVCore Teller > Uninstall

Restrict installer directory permissions

windows

Manually secure directory permissions where SERVCoreTeller_2.0.40D.msi is installed

icacls "C:\Program Files\Topaz\SERVCore Teller" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" "Users:(OI)(CI)RX"

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges on affected systems
  • Monitor for unauthorized privilege escalation attempts and file permission changes

🔍 How to Verify

Check if Vulnerable:

Check installed version via Control Panel > Programs > Topaz SERVCore Teller properties, or check for existence of SERVCoreTeller_2.0.40D.msi file

Check Version:

wmic product where name="Topaz SERVCore Teller" get version

Verify Fix Applied:

Verify latest version is installed and SERVCoreTeller_2.0.40D.msi file is no longer present or has been updated

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing unexpected service installation/modification
  • Security logs showing privilege escalation attempts
  • File system audit logs showing permission changes to Topaz directories

Network Indicators:

  • No network indicators - purely local exploitation

SIEM Query:

EventID=4688 OR EventID=4697 OR EventID=4700 AND ProcessName LIKE '%SERVCore%' OR CommandLine LIKE '%nssm%'

🔗 References

📤 Share & Export