# 艾默生 PAC 9.80 未引用服务路径漏洞
N/A
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: Emerson PAC Machine Edition 9.80 Build 8695 - 'TrapiServer' Unquoted Service Path - Windows local Exploit -- 🔗来源链接
标签:exploit
神龙速读:
### 漏洞关键信息
- **EDB-ID:** 50745
- **CVE:** N/A
- **Author:** Luis Martínez
- **Type:** LOCAL
- **Platform:** WINDOWS
- **Date:** 2022-02-16
- **Vulnerability Type:** Unquoted Service Path
- **Vulnerable App:** Emerson PAC Machine Edition 9.80 Build 8695
#### 漏洞详情
- **Vendor Homepage:** https://www.emerson.com/en-us
- **Software Link:** https://www.opertek.com/descargar-software/?prc=_326
- **Tested Version:** 9.80 Build 8695
- **Tested on OS:** Windows 10 Pro x64
#### 发现步骤
```cmd
C:\>wmic service get name, pathname, displayname, startmode | findstr "Auto" | findstr /i /v "C:\Windows\\" | findstr /i "TrapiServer" |findstr /i /v """"
```
#### 漏洞利用
A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.
标题: Trusted Partner in Helping to Solve the Biggest Challenges of Modern Life | Emerson US -- 🔗来源链接
标签:product
神龙速读:
从这张截图中,关于漏洞的关键信息如下:
- **隐私政策和Cookie通知**:
- 网页使用cookie和类似技术,用户可以通过访问“Privacy Notice”和“Cookie Notice”了解更多详情。
- 用户可以选择接受所有cookie或通过“Cookies Settings”进行设置。
- **报告漏洞**:
- 在底部导航栏中,有一个链接“Report a Vulnerability”,表明该网站有机制接收和处理潜在的安全漏洞报告。
这些信息表明该网站有基本的隐私保护和漏洞报告机制。
标题: Emerson PAC Machine Edition 9.80 Build 8695 - 'TrapiServer' Unquoted Service Path | Advisories | VulnCheck -- 🔗来源链接
标签:third-party-advisory
神龙速读:
### 漏洞关键信息
#### 漏洞名称
Emerson PAC Machine Edition 9.80 Build 8695 - 'TrapiServer' Unquoted Service Path
#### 严重性
HIGH
#### 发布日期
January 13, 2026
#### 影响范围
- Emerson PAC Machine Edition 9.80
#### 漏洞ID
- CVE-2022-50930
#### 漏洞类型
CWE-428 Unquoted Search Path or Element
#### CVSS评分
9.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/SC:H/CI:H/IA:H)
#### 参考链接
- [ExploitDB-50745](#)
- [Emerson Official Homepage](#)
- [Software Download Link](#)
#### 发现者
Luis Martinez
#### 描述
Emerson PAC Machine Edition 9.80 在 TrapiServer 服务中存在未加引号的服务路径漏洞,允许本地用户以特权执行代码。攻击者可以利用服务配置中的未加引号的路径注入恶意代码,这些代码会在服务启动时以 LocalSystem 权限执行。
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.