CVE-2024-58288: CWE-428: Unquoted Search Path or Element in Genexus Genexus Protection Server
Genexus Protection Server 9.7.2.10 contains an unquoted service path vulnerability in the protsrvservice Windows service configuration. Attackers can exploit the unquoted binary path to execute arbitrary code with elevated LocalSystem privileges by placing malicious executables in specific file system locations.
AI Analysis
Technical Summary
CVE-2024-58288 is an unquoted search path vulnerability (CWE-428) found in Genexus Protection Server version 9.7.2.10, specifically in the protsrvservice Windows service configuration. This vulnerability arises because the service executable path is not enclosed in quotes, causing Windows to incorrectly parse the path if it contains spaces. An attacker with local access can exploit this by placing a malicious executable in a directory that Windows searches before the legitimate service executable. When the service starts or restarts, the malicious executable is run with LocalSystem privileges, granting the attacker full control over the system. The vulnerability does not require user interaction or prior authentication, increasing its risk profile. The CVSS v4.0 score is 8.7 (high), reflecting the network attack vector, low complexity, no privileges required, and high impact on confidentiality, integrity, and availability. No public exploits are currently known, but the vulnerability is straightforward to exploit given local access. The root cause is improper quoting of the binary path in the Windows service configuration, a common misconfiguration that can be mitigated by enclosing paths in quotes and securing directory permissions. This vulnerability is particularly dangerous in environments where Genexus Protection Server is used to protect critical applications or data, as it can lead to full system compromise.
Potential Impact
For European organizations, exploitation of CVE-2024-58288 could lead to complete system compromise of servers running Genexus Protection Server 9.7.2.10. Attackers gaining LocalSystem privileges can bypass all security controls, access sensitive data, disrupt services, or use the compromised system as a foothold for lateral movement within the network. This is especially critical for industries such as finance, healthcare, and government, where data confidentiality and service availability are paramount. The vulnerability's ease of exploitation without user interaction or authentication increases the risk of rapid compromise once local access is obtained, for example via phishing or insider threats. Organizations relying on Genexus Protection Server for application protection may face significant operational and reputational damage if exploited. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
1. Immediately verify and correct the service executable path in the Windows service configuration for protsrvservice by enclosing the entire path in double quotes to prevent unquoted path parsing issues. 2. Restrict write permissions on all directories in the service executable path to trusted administrators only, preventing attackers from placing malicious executables. 3. Implement application whitelisting to prevent unauthorized executables from running. 4. Monitor file system changes in directories related to the service path for suspicious activity. 5. Limit local user privileges to reduce the risk of local exploitation. 6. If possible, upgrade to a patched version of Genexus Protection Server once available or apply vendor-provided patches. 7. Conduct regular audits of service configurations across the environment to detect similar unquoted path vulnerabilities. 8. Educate system administrators about the risks of unquoted service paths and secure service configuration best practices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden
CVE-2024-58288: CWE-428: Unquoted Search Path or Element in Genexus Genexus Protection Server
Description
Genexus Protection Server 9.7.2.10 contains an unquoted service path vulnerability in the protsrvservice Windows service configuration. Attackers can exploit the unquoted binary path to execute arbitrary code with elevated LocalSystem privileges by placing malicious executables in specific file system locations.
AI-Powered Analysis
Technical Analysis
CVE-2024-58288 is an unquoted search path vulnerability (CWE-428) found in Genexus Protection Server version 9.7.2.10, specifically in the protsrvservice Windows service configuration. This vulnerability arises because the service executable path is not enclosed in quotes, causing Windows to incorrectly parse the path if it contains spaces. An attacker with local access can exploit this by placing a malicious executable in a directory that Windows searches before the legitimate service executable. When the service starts or restarts, the malicious executable is run with LocalSystem privileges, granting the attacker full control over the system. The vulnerability does not require user interaction or prior authentication, increasing its risk profile. The CVSS v4.0 score is 8.7 (high), reflecting the network attack vector, low complexity, no privileges required, and high impact on confidentiality, integrity, and availability. No public exploits are currently known, but the vulnerability is straightforward to exploit given local access. The root cause is improper quoting of the binary path in the Windows service configuration, a common misconfiguration that can be mitigated by enclosing paths in quotes and securing directory permissions. This vulnerability is particularly dangerous in environments where Genexus Protection Server is used to protect critical applications or data, as it can lead to full system compromise.
Potential Impact
For European organizations, exploitation of CVE-2024-58288 could lead to complete system compromise of servers running Genexus Protection Server 9.7.2.10. Attackers gaining LocalSystem privileges can bypass all security controls, access sensitive data, disrupt services, or use the compromised system as a foothold for lateral movement within the network. This is especially critical for industries such as finance, healthcare, and government, where data confidentiality and service availability are paramount. The vulnerability's ease of exploitation without user interaction or authentication increases the risk of rapid compromise once local access is obtained, for example via phishing or insider threats. Organizations relying on Genexus Protection Server for application protection may face significant operational and reputational damage if exploited. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
1. Immediately verify and correct the service executable path in the Windows service configuration for protsrvservice by enclosing the entire path in double quotes to prevent unquoted path parsing issues. 2. Restrict write permissions on all directories in the service executable path to trusted administrators only, preventing attackers from placing malicious executables. 3. Implement application whitelisting to prevent unauthorized executables from running. 4. Monitor file system changes in directories related to the service path for suspicious activity. 5. Limit local user privileges to reduce the risk of local exploitation. 6. If possible, upgrade to a patched version of Genexus Protection Server once available or apply vendor-provided patches. 7. Conduct regular audits of service configurations across the environment to detect similar unquoted path vulnerabilities. 8. Educate system administrators about the risks of unquoted service paths and secure service configuration best practices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-12-10T23:46:14.009Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693b3a6c22246175c6a3cf1c
Added to database: 12/11/2025, 9:41:00 PM
Last enriched: 12/11/2025, 9:55:57 PM
Last updated: 12/11/2025, 10:47:27 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66451: CWE-20: Improper Input Validation in danny-avila LibreChat
MediumCVE-2025-66588: CWE-824 Access of Uninitialized Pointer in AzeoTech DAQFactory
HighCVE-2025-66587: CWE-122 Heap-based Buffer Overflow in AzeoTech DAQFactory
HighCVE-2025-66586: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in AzeoTech DAQFactory
HighCVE-2025-13664: CWE-427 Uncontrolled Search Path Element in Altera Quartus Prime Standard
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.