CVE-2019-25304
Unknown Unknown - Not Provided
Unquoted Service Path in SecurOS Enterprise Enables Privilege Escalation

Publication date: 2026-02-06

Last updated on: 2026-02-06

Assigner: VulnCheck

Description
SecurOS Enterprise 10.2 contains an unquoted service path vulnerability in the SecurosCtrlService that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in C:\Program Files (x86)\ISS\SecurOS\ to insert malicious code that would execute with system-level permissions during service startup.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-06
Last Modified
2026-02-06
Generated
2026-05-07
AI Q&A
2026-02-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
iss securos 10.2
intelligent_security_system securos_enterprise to 10.0.18362 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-428 The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability can be detected by checking for unquoted service paths in the Windows services, specifically the 'SecurosCtrlService' service path."}, {'type': 'paragraph', 'content': 'You can use Windows command line tools to identify unquoted service paths. For example, running the following command in an elevated command prompt will list services and their executable paths:'}, {'type': 'list_item', 'content': 'sc qc SecurosCtrlService'}, {'type': 'paragraph', 'content': 'If the path returned is unquoted and contains spaces (such as C:\\Program Files (x86)\\ISS\\SecurOS\\securos_svc.exe), it indicates the presence of this vulnerability.'}, {'type': 'paragraph', 'content': 'Additionally, you can search all services for unquoted paths by running a PowerShell command like:'}, {'type': 'list_item', 'content': 'Get-WmiObject win32_service | where { $_.PathName -like \'* *\' -and $_.PathName -notlike \'"*"\' } | select Name, PathName'}, {'type': 'paragraph', 'content': 'This command lists all services with spaces in their executable path that are not enclosed in quotes, helping to detect similar unquoted service path vulnerabilities.'}] [2, 3]


How can this vulnerability impact me? :

This vulnerability allows a local attacker with low privileges to execute arbitrary code with system-level privileges by placing malicious executables in the unquoted service path.

Exploitation can lead to full system compromise, including unauthorized access, modification, or disruption of system confidentiality, integrity, and availability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'To mitigate this vulnerability, the immediate step is to correct the unquoted service path by enclosing the entire executable path in double quotes.'}, {'type': 'paragraph', 'content': "For the 'SecurosCtrlService', update the service path from:"}, {'type': 'list_item', 'content': 'C:\\Program Files (x86)\\ISS\\SecurOS\\securos_svc.exe'}, {'type': 'paragraph', 'content': 'to:'}, {'type': 'list_item', 'content': '"C:\\Program Files (x86)\\ISS\\SecurOS\\securos_svc.exe"'}, {'type': 'paragraph', 'content': 'This can be done using the Windows Registry Editor or by using the command line with administrative privileges.'}, {'type': 'paragraph', 'content': 'Additionally, ensure that only trusted users have write permissions to directories in the service path to prevent insertion of malicious executables.'}, {'type': 'paragraph', 'content': 'Restart the service or reboot the system after applying the fix to ensure the corrected path is used.'}] [2, 3]


Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2019-25304 is an unquoted service path vulnerability in the SecurosCtrlService of Intelligent Security System\'s SecurOS Enterprise version 10.2. The service path "C:\\Program Files (x86)\\ISS\\SecurOS\\" is not enclosed in quotes, which allows local users to insert malicious executables or code into the path.'}, {'type': 'paragraph', 'content': 'When the service starts, the operating system may execute the malicious code with elevated system-level privileges, leading to potential privilege escalation.'}] [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart