Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Jan 16, 2026
Tosibox Key Service 3.3.0 Local Privilege Escalation via Unquoted Service Path
CVE-2024-58315
Description
Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.
Affected products
2- Range: = 3.3.0
- Tosibox Oy/Tosibox Key Servicev5Range: Unknown
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- packetstormsecurity.com/files/177260/mitreexploit
- www.tosi.netmitrevendor-advisory
- www.vulncheck.com/advisories/tosibox-key-service-local-privilege-escalation-via-unquoted-service-pathmitrethird-party-advisory
- www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5812.phpmitrethird-party-advisory
News mentions
0No linked articles in our index yet.