← Back to CVEs
CVE-2024-58315
HIGH7.8
Description
Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.
CVE Details
CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published12/30/2025
Last Modified1/16/2026
Sourcenvd
Honeypot Sightings0
Affected Products
microsoft:windowstosi:tosibox_key
Weaknesses (CWE)
CWE-428
References
https://packetstormsecurity.com/files/177260/(disclosure@vulncheck.com)
https://www.tosi.net/(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/tosibox-key-service-local-privilege-escalation-via-unquoted-service-path(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5812.php(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5812.php(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.