Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.
References
| Link | Resource |
|---|---|
| https://packetstormsecurity.com/files/177260/ | Third Party Advisory |
| https://www.tosi.net/ | Product |
| https://www.vulncheck.com/advisories/tosibox-key-service-local-privilege-escalation-via-unquoted-service-path | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5812.php | Exploit Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5812.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-30 23:15
Updated : 2026-01-16 19:16
NVD link : CVE-2024-58315
Mitre link : CVE-2024-58315
CVE.ORG link : CVE-2024-58315
JSON object : View
Products Affected
microsoft
- windows
tosi
- tosibox_key
CWE
CWE-428
Unquoted Search Path or Element
