Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.
History

Fri, 09 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Tosi
Tosi tosibox Key
CPEs cpe:2.3:a:tosi:tosibox_key:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows
Tosi
Tosi tosibox Key

Fri, 02 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 30 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
Description Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.
Title Tosibox Key Service 3.3.0 Local Privilege Escalation via Unquoted Service Path
Weaknesses CWE-428
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-12-30T22:41:44.147Z

Updated: 2026-01-02T14:39:11.502Z

Reserved: 2025-12-12T14:01:49.143Z

Link: CVE-2024-58315

cve-icon Vulnrichment

Updated: 2026-01-02T14:24:59.837Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-30T23:15:48.700

Modified: 2026-01-09T22:02:57.330

Link: CVE-2024-58315

cve-icon Redhat

No data.