CVE-2019-25288
Unknown Unknown - Not Provided
Unquoted Service Path Vulnerability in Wacom WTabletService Enables Privilege Escalation

Publication date: 2026-02-05

Last updated on: 2026-02-05

Assigner: VulnCheck

Description
Wacom WTabletService 6.6.7-3 contains an unquoted service path vulnerability that allows local attackers to execute malicious code with elevated privileges. Attackers can insert an executable file in the service path to run unauthorized code when the service restarts or the system reboots.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-05
Last Modified
2026-02-05
Generated
2026-05-07
AI Q&A
2026-02-05
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wacom wtabletservice 6.6.7-3
wacom wtabletservice 6.3.7.3
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-428 The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability impact me? :

This vulnerability allows a local attacker to escalate their privileges by executing malicious code with the highest system privileges (LocalSystem).

  • The attacker needs local access to the machine to place the malicious executable.
  • Once exploited, the attacker can gain full control over the system, potentially leading to data theft, system manipulation, or further compromise.
  • Because the service runs automatically and with elevated privileges, the malicious code can persist and execute on system reboot or service restart.

Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "The vulnerability in Wacom WTabletService version 6.6.7-3 is an unquoted service path issue affecting the 'WTabletServicePro' Windows service. Because the service executable path contains spaces and is not enclosed in quotes, a local attacker can place a malicious executable in a location that the system misinterprets when starting the service."}, {'type': 'paragraph', 'content': 'When the service restarts or the system reboots, the malicious executable can be run with elevated privileges (LocalSystem), allowing the attacker to execute unauthorized code with high-level access.'}] [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking the service executable path for unquoted spaces in the Wacom WTabletServicePro Windows service.

A common method is to inspect the service path using Windows command line tools to see if the path is unquoted and contains spaces.

  • Run the command: sc qc WTabletServicePro
  • Check the BINARY_PATH_NAME output for unquoted paths with spaces, for example: C:\Program Files\Tablet\Wacom\WTabletServicePro.exe

If the path is unquoted and contains spaces, the service is vulnerable to this unquoted service path issue.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately quote the service executable path to prevent the system from misinterpreting the path and executing malicious code.

Alternatively, you can rename the service executable path to remove spaces or move the executable to a path without spaces.

Ensure that only trusted users have local access to the machine to prevent insertion of malicious executables.

If available, update or patch the Wacom WTabletService to a version where this vulnerability is fixed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart