mobatek CVE Vulnerabilities & Metrics

Focus on mobatek vulnerabilities and metrics.

Last updated: 12 May 2026, 22:25 UTC

About mobatek Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with mobatek. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total mobatek CVEs: 9
Earliest CVE date: 04 Nov 2015, 03:59 UTC
Latest CVE date: 09 Mar 2026, 16:16 UTC

Latest CVE reference: CVE-2026-25866

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical mobatek CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.61

Max CVSS: 10.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 3
4.0-6.9 5
7.0-8.9 1
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS mobatek CVEs

These are the five CVEs with the highest CVSS scores for mobatek, sorted by severity first and recency.

All CVEs for mobatek

CVE-2026-25866 mobatek vulnerability CVSS: 0 09 Mar 2026, 16:16 UTC

MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search path behavior by placing a malicious executable earlier in the search order, resulting in arbitrary code execution in the context of the affected user.

CVE-2022-38337 mobatek vulnerability CVSS: 0 06 Dec 2022, 00:15 UTC

When aborting a SFTP connection, MobaXterm before v22.1 sends a hardcoded password to the server. The server treats this as an invalid login attempt which can result in a Denial of Service (DoS) for the user if services like fail2ban are used.

CVE-2022-38336 mobatek vulnerability CVSS: 0 06 Dec 2022, 00:15 UTC

An access control issue in MobaXterm before v22.1 allows attackers to make connections to the server via the SSH or SFTP protocols without authentication.

CVE-2021-28847 mobatek vulnerability CVSS: 5.0 03 Jun 2021, 11:15 UTC

MobaXterm before 21.0 allows remote servers to cause a denial of service (Windows GUI hang) via tab title change requests that are sent repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls.

CVE-2019-16305 mobatek vulnerability CVSS: 6.8 14 Sep 2019, 15:15 UTC

In MobaXterm 11.1 and 12.1, the protocol handler is vulnerable to command injection. A crafted link can trigger a popup asking whether the user wants to run MobaXterm to handle the link. If accepted, another popup appears asking for further confirmation. If this is also accepted, command execution is achieved, as demonstrated by the MobaXterm://`calc` URI.

CVE-2019-13475 mobatek vulnerability CVSS: 6.8 09 Jul 2019, 22:15 UTC

In MobaXterm 11.1, the mobaxterm: URI handler has an argument injection vulnerability that allows remote attackers to execute arbitrary commands when the user visits a specially crafted URL. Based on the available command-line arguments of the software, one can simply inject -exec to execute arbitrary commands. The additional arguments -hideterm and -exitwhendone in the payload make the attack less visible.

CVE-2019-7690 mobatek vulnerability CVSS: 5.0 13 May 2019, 16:29 UTC

In MobaTek MobaXterm Personal Edition v11.1 Build 3860, the SSH private key and its password can be retrieved from process memory for the lifetime of the process, even after the user disconnects from the remote SSH server. This affects Passwordless Authentication that has a Password Protected SSH Private Key.

CVE-2017-15376 mobatek vulnerability CVSS: 10.0 16 Oct 2017, 04:29 UTC

The TELNET service in Mobatek MobaXterm 10.4 does not require authentication, which allows remote attackers to execute arbitrary commands via TCP port 23.

CVE-2017-6805 mobatek vulnerability CVSS: 5.0 20 Mar 2017, 16:59 UTC

Directory traversal vulnerability in the TFTP server in MobaXterm Personal Edition 9.4 allows remote attackers to read arbitrary files via a .. (dot dot) in a GET command.

CVE-2015-7244 mobatek vulnerability CVSS: 7.5 04 Nov 2015, 03:59 UTC

The default configuration of the server in MobaXterm before 8.3 has a disabled Access Control setting and consequently does not require authentication for X11 connections, which allows remote attackers to execute arbitrary commands or obtain sensitive information via X11 packets.