Cyber Posture

CVE-2019-25272

HighPublic PoC

Published: 05 February 2026

Published
05 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2019-25272 is a high-severity Unquoted Search Path or Element (CWE-428) vulnerability in Tenaxsoft (inferred from references). Its CVSS base score is 7.8 (High).

Operationally, ranked at the 0.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-2 (Baseline Configuration) and CM-6 (Configuration Settings).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Establishes and enforces secure configuration settings for services, including proper quoting of executable paths to prevent exploitation of unquoted service paths.

prevent

Requires identification, reporting, and timely remediation of flaws like unquoted service paths to eliminate the vulnerability before exploitation.

prevent

Develops and maintains baseline configurations that specify correctly quoted service paths, preventing deployment or operation with vulnerable settings.

NVD Description

TexasSoft CyberPlanet 6.4.131 contains an unquoted service path vulnerability in the CCSrvProxy service that allows local attackers to execute arbitrary code. Attackers can exploit the unquoted path in 'C:\Program Files (x86)\TenaxSoft\CyberPlanet\SrvProxy.exe' to inject malicious executables and gain elevated system privileges.

Deeper analysisAI

TexasSoft CyberPlanet 6.4.131 is affected by CVE-2019-25272, an unquoted service path vulnerability in the CCSrvProxy service. The issue stems from the service binary path 'C:\Program Files (x86)\TenaxSoft\CyberPlanet\SrvProxy.exe', which lacks proper quoting, enabling local attackers to execute arbitrary code. This flaw is rated with a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-428 (Unquoted Search Path or Element).

Local attackers with low privileges can exploit this vulnerability by placing a malicious executable in one of the search path directories preceding the intended service binary location, such as C:\Program Files (x86)\TenaxSoft\CyberPlanet\. When the CCSrvProxy service starts or restarts, it executes the attacker's malicious file instead, allowing elevation to system privileges and full control over the affected system, including high confidentiality, integrity, and availability impacts.

Advisories and related resources, including a VulnCheck advisory on the TexasSoft CyberPlanet CCSrvProxy unquoted service path, an Exploit-DB entry (47724) detailing a proof-of-concept, and the vendor site at tenaxsoft.com, provide further technical details on the issue, though specific patch information is not detailed in the CVE description. Security practitioners should verify service configurations and apply any available updates from the vendor.

Details

CWE(s)

Affected Products

Tenaxsoft
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2019-25276Shared CWE-428
CVE-2020-37098Shared CWE-428
CVE-2021-47809Shared CWE-428
CVE-2024-57276Shared CWE-428
CVE-2020-37100Shared CWE-428
CVE-2021-47790Shared CWE-428
CVE-2020-36976Shared CWE-428
CVE-2021-47787Shared CWE-428
CVE-2021-47833Shared CWE-428
CVE-2021-47861Shared CWE-428

References