CVE Alert: CVE-2025-10941 – Topaz – SERVCore Teller

CVE-2025-10941

HIGHNo exploitation known

A vulnerability was determined in Topaz SERVCore Teller 2.14.0-RC2/2.14.1. Affected by this issue is some unknown functionality of the file SERVCoreTeller_2.0.40D.msi of the component Installer. Executing manipulation can lead to permission issues. The attack needs to be launched locally. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS v3.1 (7.8)
Vendor
Topaz
Product
SERVCore Teller
Versions
2.14.0-RC2 | 2.14.1
CWE
CWE-275, Permission Issues
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:R
Published
2025-09-25T11:02:05.879Z
Updated
2025-09-25T13:19:05.675Z

AI Summary Analysis

Risk verdict

High risk of local privilege escalation via the SERVCore Teller installer; exploitation is not shown as active, but could grant full control on affected hosts once local access is obtained.

Why this matters

The flaw resides in the installer component, enabling permission issues with high impact on confidentiality, integrity and availability. In financial or teller environments, an attacker with local access could elevate to administrator, tamper with installation state, or persist across sessions, potentially compromising data and service availability.

Most likely attack path

Attacker requires local access and uses manipulated installer data to trigger the privilege escalation during SERVCoreTeller_2.0.40D.msi handling. With Local Access, attack complexity is low and privileges required are low, so a standard user could feasibly exploit it, gaining high-impact access without user interaction. Lateral movement is limited by scope, but elevated privileges on the host could enable broader access to installed components and related services.

Who is most exposed

Organizations deploying SERVCore Teller on Windows endpoints for teller or kiosk-like use in finance/retail settings are most at risk, especially where installers and updates are run with limited oversight or broad write permissions.

Detection ideas

  • Monitor for unexpected changes to SERVCoreTeller_2.0.40D.msi and its directory permissions.
  • Look for anomalous MSI execution events (msiexec) initiated by non-admin processes.
  • File permission modifications in installer paths outside standard change windows.
  • Unusual process trees around installation events (child processes elevating privileges).
  • Local accounts attempting to write to restricted installer folders outside scheduled updates.

Mitigation and prioritisation

  • Patch to vendor-supplied fixed release; if unavailable, apply strict access controls on installer directories.
  • Enforce least privilege for installation workflows and restrict MSI execution to administrators.
  • Implement application whitelisting and digital signing validation for installers.
  • Strengthen change-management: verify integrity of installer files before deployment; monitor and alert on permission changes in installer paths.
  • If KEV or EPSS data indicate higher risk, escalate; otherwise treat as high-priority due to impact potential and local-exploitation nature.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.