Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.
History

Tue, 30 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
Description Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.
Title Tosibox Key Service 3.3.0 Local Privilege Escalation via Unquoted Service Path
Weaknesses CWE-428
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-30T22:41:44.147Z

Reserved: 2025-12-12T14:01:49.143Z

Link: CVE-2024-58315

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-30T23:15:48.700

Modified: 2025-12-30T23:15:48.700

Link: CVE-2024-58315

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.