← Volver a CVEs
CVE-2024-58315
HIGH7.8
Descripcion
Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.
Detalles CVE
Puntuacion CVSS v3.17.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado12/30/2025
Ultima modificacion1/16/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
microsoft:windowstosi:tosibox_key
Debilidades (CWE)
CWE-428
Referencias
https://packetstormsecurity.com/files/177260/(disclosure@vulncheck.com)
https://www.tosi.net/(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/tosibox-key-service-local-privilege-escalation-via-unquoted-service-path(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5812.php(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5812.php(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.