CVE-2022-50920
Unquoted Service Path in Sandboxie-Plus SbieSvc Enables Privilege Escalation
Publication date: 2026-01-13
Last updated on: 2026-01-13
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| unknown_vendor | sandboxie_plus | 5.50.2 |
| unknown_vendor | sandboxie_plus | From 5.50.2 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-428 | The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an unquoted service path issue in the Sandboxie-Plus 5.50.2 Windows service named 'SbieSvc.' Because the service executable path is not enclosed in quotes, a local attacker can place a malicious executable in a location that Windows might mistakenly execute during service startup. This allows the attacker to run arbitrary code with LocalSystem privileges, effectively escalating their privileges on the system. [1, 2]
How can this vulnerability impact me? :
Exploiting this vulnerability can allow a local attacker to execute arbitrary code with LocalSystem privileges, which is the highest level of privilege on a Windows system. This means the attacker can gain full control over the affected system, potentially leading to unauthorized access, data manipulation, or disruption of system operations. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect the vulnerability by checking the service configuration for the SbieSvc Windows service to see if its binary path is unquoted. A suggested command is: sc qc SbieSvc. This command outputs the service configuration, including the executable path. If the path is unquoted (e.g., C:\Program Files\Sandboxie-Plus\SbieSvc.exe without quotes), the system is vulnerable to this issue. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves correcting the unquoted service path by enclosing the executable path in quotes to prevent execution of malicious binaries. Alternatively, ensure that no malicious executables exist in the directories that could be interpreted due to the unquoted path. Applying updates or patches from Sandboxie-Plus, if available, is also recommended to fix the vulnerability. [1, 2]