CVE-2024-58315
Severity CVSS v4.0:
HIGH
Type:
CWE-428
Unquoted Search Path or Element
Publication date:
30/12/2025
Last modified:
16/01/2026
Description
Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.
Impact
Base Score 4.0
8.50
Severity 4.0
HIGH
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:tosi:tosibox_key:*:*:*:*:*:*:*:* | 3.3.0 (including) | |
| cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://packetstormsecurity.com/files/177260/
- https://www.tosi.net/
- https://www.vulncheck.com/advisories/tosibox-key-service-local-privilege-escalation-via-unquoted-service-path
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5812.php
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5812.php



