top of page
perceptive_background_267k.jpg

WibuKey Runtime 6.51 contains an unquoted service path vulnerability in the WkSvW32.exe service that allows local attackers to potentially execute arbitrary cod…

Published:

15 januari 2026 om 23:00:00

Alert date:

16 januari 2026 om 01:13:28

Source:

nvd.nist.gov

Click to open the original link from this advisory

Enterprise Applications, Operating Systems

WibuKey Runtime 6.51 contains an unquoted service path vulnerability in the WkSvW32.exe service that enables local privilege escalation. Attackers can exploit the unquoted path 'C:\PROGRAM FILES (X86)\WIBUKEY\SERVER\WkSvW32.exe' to inject malicious executables. This vulnerability allows local attackers to potentially execute arbitrary code with elevated privileges. The flaw affects the WibuKey licensing software commonly used for software protection and licensing management.

Technical details

Mitigation steps:

Affected products:

WibuKey Runtime

Related links:

Related CVE's:

Related threat actors:

IOC's:

C:\PROGRAM FILES (X86)\WIBUKEY\SERVER\WkSvW32.exe

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page