Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.
Metrics
Affected Vendors & Products
References
History
Fri, 09 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Tosi Tosi tosibox Key |
|
| CPEs | cpe:2.3:a:tosi:tosibox_key:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows Tosi Tosi tosibox Key |
Fri, 02 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 30 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot. | |
| Title | Tosibox Key Service 3.3.0 Local Privilege Escalation via Unquoted Service Path | |
| Weaknesses | CWE-428 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-30T22:41:44.147Z
Updated: 2026-01-02T14:39:11.502Z
Reserved: 2025-12-12T14:01:49.143Z
Link: CVE-2024-58315
Updated: 2026-01-02T14:24:59.837Z
Status : Analyzed
Published: 2025-12-30T23:15:48.700
Modified: 2026-01-09T22:02:57.330
Link: CVE-2024-58315
No data.