Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-58315: Unquoted Search Path or Element in Tosibox Oy Tosibox Key Service

0
High
VulnerabilityCVE-2024-58315cvecve-2024-58315
Published: Tue Dec 30 2025 (12/30/2025, 22:41:44 UTC)
Source: CVE Database V5
Vendor/Project: Tosibox Oy
Product: Tosibox Key Service

Description

Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.

AI-Powered Analysis

AILast updated: 01/17/2026, 07:23:14 UTC

Technical Analysis

CVE-2024-58315 identifies an unquoted service path vulnerability in Tosibox Key Service version 3.3.0. This vulnerability occurs when the Windows service executable path contains spaces but is not enclosed in quotation marks. During the service startup, Windows parses the path and may mistakenly execute malicious code placed in directories along the path if an attacker can write to those locations. Since the service runs with elevated privileges, executing malicious code in this context allows privilege escalation from a local non-privileged user to SYSTEM level. The vulnerability requires local access but no authentication or user interaction, making it easier to exploit in environments where multiple users have access or where attackers have gained limited footholds. The CVSS 4.0 base score is 8.5 (high), reflecting the significant impact on confidentiality, integrity, and availability due to potential full system compromise. No specific affected versions beyond 3.3.0 are listed, and no patches or exploits are currently documented. The vulnerability is particularly concerning for organizations relying on Tosibox Key Service for secure remote access or network segmentation, as attackers could leverage this flaw to bypass security controls and gain persistent privileged access.

Potential Impact

For European organizations, the impact of CVE-2024-58315 is substantial. Tosibox Key Service is often deployed in industrial, manufacturing, and critical infrastructure sectors to provide secure remote access and network segmentation. Exploitation could allow attackers to escalate privileges on critical systems, leading to unauthorized access, data theft, sabotage, or disruption of operations. This could compromise sensitive industrial control systems or business-critical environments, impacting operational continuity and safety. The vulnerability's local access requirement limits remote exploitation but does not eliminate risk, especially in environments with shared access or where attackers have already gained limited entry. The potential for elevated privileges means attackers could disable security controls, install persistent malware, or move laterally within networks. European organizations with stringent regulatory requirements for data protection and operational resilience may face compliance and reputational risks if exploited.

Mitigation Recommendations

Organizations should proactively audit all Tosibox Key Service installations to identify unquoted service paths and verify the version in use. Immediate mitigation includes restricting write permissions on directories in the service path to prevent unauthorized code placement. Applying the official patch from Tosibox Oy once released is critical. Until patches are available, consider running the service with the least privileges necessary or isolating affected systems to limit local user access. Employ endpoint detection and response (EDR) tools to monitor for suspicious activity related to service startup or privilege escalation attempts. Conduct regular local privilege escalation assessments and harden local user permissions. Additionally, implement strict access controls and network segmentation to reduce the risk of attackers gaining local access. Maintain up-to-date backups and incident response plans tailored to potential privilege escalation scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-12T14:01:49.143Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6954592edb813ff03e385577

Added to database: 12/30/2025, 10:58:54 PM

Last enriched: 1/17/2026, 7:23:14 AM

Last updated: 2/7/2026, 1:15:15 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats