Search criteria
1 vulnerability by Genexus
CVE-2024-58288 (GCVE-0-2024-58288)
Vulnerability from cvelistv5 – Published: 2025-12-11 21:33 – Updated: 2025-12-11 21:33
VLAI?
Summary
Genexus Protection Server 9.7.2.10 contains an unquoted service path vulnerability in the protsrvservice Windows service configuration. Attackers can exploit the unquoted binary path to execute arbitrary code with elevated LocalSystem privileges by placing malicious executables in specific file system locations.
Severity ?
CWE
- CWE-428 - Unquoted Search Path or Element
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Genexus | Genexus Protection Server |
Affected:
9.7.2.10
|
Credits
SamAlucard, Sam Alucard
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Genexus Protection Server",
"vendor": "Genexus",
"versions": [
{
"status": "affected",
"version": "9.7.2.10"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "SamAlucard, Sam Alucard"
}
],
"datePublic": "2024-07-31T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eGenexus Protection Server 9.7.2.10 contains an unquoted service path vulnerability in the protsrvservice Windows service configuration. Attackers can exploit the unquoted binary path to execute arbitrary code with elevated LocalSystem privileges by placing malicious executables in specific file system locations.\u003c/p\u003e"
}
],
"value": "Genexus Protection Server 9.7.2.10 contains an unquoted service path vulnerability in the protsrvservice Windows service configuration. Attackers can exploit the unquoted binary path to execute arbitrary code with elevated LocalSystem privileges by placing malicious executables in specific file system locations."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-428",
"description": "CWE-428: Unquoted Search Path or Element",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-11T21:33:58.572Z",
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck"
},
"references": [
{
"name": "ExploitDB-52065",
"tags": [
"exploit"
],
"url": "https://www.exploit-db.com/exploits/52065"
},
{
"name": "Official Genexus Homepage",
"tags": [
"product"
],
"url": "https://www.genexus.com/es/"
},
{
"name": "Genexus Software Download Center",
"tags": [
"product"
],
"url": "https://www.genexus.com/en/developers/downloadcenter?data=;;"
},
{
"name": "VulnCheck Advisory: Genexus Protection Server 9.7.2.10 Unquoted Service Path Privilege Escalation",
"tags": [
"third-party-advisory"
],
"url": "https://www.vulncheck.com/advisories/genexus-protection-server-unquoted-service-path-privilege-escalation"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Genexus Protection Server 9.7.2.10 Unquoted Service Path Privilege Escalation",
"x_generator": {
"engine": "vulncheck"
}
}
},
"cveMetadata": {
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"cveId": "CVE-2024-58288",
"datePublished": "2025-12-11T21:33:58.572Z",
"dateReserved": "2025-12-10T23:46:14.009Z",
"dateUpdated": "2025-12-11T21:33:58.572Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}