CVE-2019-25304
Unquoted Service Path in SecurOS Enterprise Enables Privilege Escalation
Publication date: 2026-02-06
Last updated on: 2026-02-06
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| iss | securos | 10.2 |
| intelligent_security_system | securos_enterprise | to 10.0.18362 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-428 | The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': "This vulnerability can be detected by checking for unquoted service paths in the Windows services, specifically the 'SecurosCtrlService' service path."}, {'type': 'paragraph', 'content': 'You can use Windows command line tools to identify unquoted service paths. For example, running the following command in an elevated command prompt will list services and their executable paths:'}, {'type': 'list_item', 'content': 'sc qc SecurosCtrlService'}, {'type': 'paragraph', 'content': 'If the path returned is unquoted and contains spaces (such as C:\\Program Files (x86)\\ISS\\SecurOS\\securos_svc.exe), it indicates the presence of this vulnerability.'}, {'type': 'paragraph', 'content': 'Additionally, you can search all services for unquoted paths by running a PowerShell command like:'}, {'type': 'list_item', 'content': 'Get-WmiObject win32_service | where { $_.PathName -like \'* *\' -and $_.PathName -notlike \'"*"\' } | select Name, PathName'}, {'type': 'paragraph', 'content': 'This command lists all services with spaces in their executable path that are not enclosed in quotes, helping to detect similar unquoted service path vulnerabilities.'}] [2, 3]
How can this vulnerability impact me? :
This vulnerability allows a local attacker with low privileges to execute arbitrary code with system-level privileges by placing malicious executables in the unquoted service path.
Exploitation can lead to full system compromise, including unauthorized access, modification, or disruption of system confidentiality, integrity, and availability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'To mitigate this vulnerability, the immediate step is to correct the unquoted service path by enclosing the entire executable path in double quotes.'}, {'type': 'paragraph', 'content': "For the 'SecurosCtrlService', update the service path from:"}, {'type': 'list_item', 'content': 'C:\\Program Files (x86)\\ISS\\SecurOS\\securos_svc.exe'}, {'type': 'paragraph', 'content': 'to:'}, {'type': 'list_item', 'content': '"C:\\Program Files (x86)\\ISS\\SecurOS\\securos_svc.exe"'}, {'type': 'paragraph', 'content': 'This can be done using the Windows Registry Editor or by using the command line with administrative privileges.'}, {'type': 'paragraph', 'content': 'Additionally, ensure that only trusted users have write permissions to directories in the service path to prevent insertion of malicious executables.'}, {'type': 'paragraph', 'content': 'Restart the service or reboot the system after applying the fix to ensure the corrected path is used.'}] [2, 3]
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2019-25304 is an unquoted service path vulnerability in the SecurosCtrlService of Intelligent Security System\'s SecurOS Enterprise version 10.2. The service path "C:\\Program Files (x86)\\ISS\\SecurOS\\" is not enclosed in quotes, which allows local users to insert malicious executables or code into the path.'}, {'type': 'paragraph', 'content': 'When the service starts, the operating system may execute the malicious code with elevated system-level privileges, leading to potential privilege escalation.'}] [2, 3]