Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-58288: CWE-428: Unquoted Search Path or Element in Genexus Genexus Protection Server

0
High
VulnerabilityCVE-2024-58288cvecve-2024-58288cwe-428
Published: Thu Dec 11 2025 (12/11/2025, 21:33:58 UTC)
Source: CVE Database V5
Vendor/Project: Genexus
Product: Genexus Protection Server

Description

Genexus Protection Server 9.7.2.10 contains an unquoted service path vulnerability in the protsrvservice Windows service configuration. Attackers can exploit the unquoted binary path to execute arbitrary code with elevated LocalSystem privileges by placing malicious executables in specific file system locations.

AI-Powered Analysis

AILast updated: 12/11/2025, 21:55:57 UTC

Technical Analysis

CVE-2024-58288 is an unquoted search path vulnerability (CWE-428) found in Genexus Protection Server version 9.7.2.10, specifically in the protsrvservice Windows service configuration. This vulnerability arises because the service executable path is not enclosed in quotes, causing Windows to incorrectly parse the path if it contains spaces. An attacker with local access can exploit this by placing a malicious executable in a directory that Windows searches before the legitimate service executable. When the service starts or restarts, the malicious executable is run with LocalSystem privileges, granting the attacker full control over the system. The vulnerability does not require user interaction or prior authentication, increasing its risk profile. The CVSS v4.0 score is 8.7 (high), reflecting the network attack vector, low complexity, no privileges required, and high impact on confidentiality, integrity, and availability. No public exploits are currently known, but the vulnerability is straightforward to exploit given local access. The root cause is improper quoting of the binary path in the Windows service configuration, a common misconfiguration that can be mitigated by enclosing paths in quotes and securing directory permissions. This vulnerability is particularly dangerous in environments where Genexus Protection Server is used to protect critical applications or data, as it can lead to full system compromise.

Potential Impact

For European organizations, exploitation of CVE-2024-58288 could lead to complete system compromise of servers running Genexus Protection Server 9.7.2.10. Attackers gaining LocalSystem privileges can bypass all security controls, access sensitive data, disrupt services, or use the compromised system as a foothold for lateral movement within the network. This is especially critical for industries such as finance, healthcare, and government, where data confidentiality and service availability are paramount. The vulnerability's ease of exploitation without user interaction or authentication increases the risk of rapid compromise once local access is obtained, for example via phishing or insider threats. Organizations relying on Genexus Protection Server for application protection may face significant operational and reputational damage if exploited. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

1. Immediately verify and correct the service executable path in the Windows service configuration for protsrvservice by enclosing the entire path in double quotes to prevent unquoted path parsing issues. 2. Restrict write permissions on all directories in the service executable path to trusted administrators only, preventing attackers from placing malicious executables. 3. Implement application whitelisting to prevent unauthorized executables from running. 4. Monitor file system changes in directories related to the service path for suspicious activity. 5. Limit local user privileges to reduce the risk of local exploitation. 6. If possible, upgrade to a patched version of Genexus Protection Server once available or apply vendor-provided patches. 7. Conduct regular audits of service configurations across the environment to detect similar unquoted path vulnerabilities. 8. Educate system administrators about the risks of unquoted service paths and secure service configuration best practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-10T23:46:14.009Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693b3a6c22246175c6a3cf1c

Added to database: 12/11/2025, 9:41:00 PM

Last enriched: 12/11/2025, 9:55:57 PM

Last updated: 12/11/2025, 10:47:27 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats