Description
WIN-PACK PRO4.8 contains an unquoted service path vulnerability in the ScheduleService that allows local users to potentially execute code with elevated system privileges. Attackers can exploit the unquoted path in 'C:\Program Files <x86>\WINPAKPRO\ScheduleService Service.exe' to inject malicious code that would execute during service startup.
Problem types
Unquoted Search Path or Element
Product status
Credits
Alan Mondragon
References
www.exploit-db.com/exploits/49691 (ExploitDB-49691)
www.security.honeywell.com/product-repository/winpak (Honeywell Product Webpage)
www.vulncheck.com/...o-scheduleservice-unquoted-service-path (VulnCheck Advisory: WIN-PACK PRO 4.8 - 'ScheduleService' Unquoted Service Path)