CVE-2022-50917
Unknown Unknown - Not Provided
Unquoted Service Path in ProtonVPN WireGuard Enables Code Execution

Publication date: 2026-01-13

Last updated on: 2026-03-02

Assigner: VulnCheck

Description
ProtonVPN 1.26.0 contains an unquoted service path vulnerability in its WireGuard service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path by placing malicious executables in specific file system locations to gain elevated privileges during service startup.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-13
Last Modified
2026-03-02
Generated
2026-05-07
AI Q&A
2026-01-14
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
proton protonvpn 1.26.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-428 The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2022-50917 is an unquoted service path vulnerability in ProtonVPN version 1.26.0's WireGuard service configuration. Because the executable path contains spaces but is not enclosed in quotes, Windows may misinterpret the path and execute a malicious executable placed by a local attacker in certain file system locations. This allows the attacker to run arbitrary code with elevated privileges when the service starts. [2, 3]


How can this vulnerability impact me? :

This vulnerability can allow a local attacker to execute arbitrary code with elevated privileges on the affected system. Since the ProtonVPN WireGuard service runs under the LocalSystem account, exploitation can lead to full system compromise, including unauthorized access, modification, or disruption of system confidentiality, integrity, and availability. [2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking the ProtonVPN WireGuard service configuration for unquoted service paths containing spaces. On a Windows system, you can use the command: `sc qc ProtonVPN.WireGuardService` to query the service configuration and inspect the executable path. If the path is unquoted and contains spaces (e.g., C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.WireGuardService.exe ...), the system is vulnerable. Additionally, you can manually inspect the service executable path in the Services MMC snap-in or via PowerShell using `Get-WmiObject win32_service | where {$_.Name -eq 'ProtonVPN.WireGuardService'}` and check the PathName property for unquoted paths. [3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include correcting the service executable path by adding quotes around the full path in the ProtonVPN WireGuard service configuration to prevent Windows from misinterpreting the path. Alternatively, updating ProtonVPN to a version where this vulnerability is fixed is recommended. As a temporary measure, restrict local user access to directories where malicious executables could be placed (e.g., C:\) to prevent exploitation. Monitoring and removing any suspicious executables placed in parent directories can also help mitigate risk. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart