← Zuruck zu CVEs
CVE-2024-58315
HIGH7.8
Beschreibung
Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.
CVE Details
CVSS v3.1 Bewertung7.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht12/30/2025
Zuletzt geandert1/16/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
microsoft:windowstosi:tosibox_key
Schwachen (CWE)
CWE-428
Referenzen
https://packetstormsecurity.com/files/177260/(disclosure@vulncheck.com)
https://www.tosi.net/(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/tosibox-key-service-local-privilege-escalation-via-unquoted-service-path(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5812.php(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5812.php(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.