Cyber Posture

CVE-2022-50913

HighPublic PoC

Published: 13 January 2026

Published
13 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 4.7th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2022-50913 is a high-severity Unquoted Search Path or Element (CWE-428) vulnerability in Itec (inferred from references). Its CVSS base score is 8.4 (High).

Operationally, ranked at the 4.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-2 (Baseline Configuration) and CM-6 (Configuration Settings).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Establishes and enforces secure configuration settings for Windows services, including properly quoting executable paths to directly prevent unquoted service path exploitation.

prevent

Requires identification, reporting, and correction of specific flaws like the unquoted service path in ITeCProteccioAppServer to eliminate the vulnerability.

prevent

Develops and maintains baseline configurations that specify secure service paths with proper quoting, preventing deployment of vulnerable service configurations.

NVD Description

ITeC ITeCProteccioAppServer contains an unquoted service path vulnerability that allows local attackers to execute code with elevated system privileges. Attackers can insert a malicious executable in the service path to gain elevated access during service restart or system reboot.

Deeper analysisAI

CVE-2022-50913 is an unquoted service path vulnerability in ITeC's ITeCProteccioAppServer software. This flaw occurs because the Windows service path for ITeCProteccioAppServer.exe is not properly quoted, enabling local attackers to execute arbitrary code with elevated system privileges. Attackers can place a malicious executable in an intermediate directory along the service's search path, which is then loaded instead of the legitimate binary. The vulnerability carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-428 (Unquoted Search Path or Element).

The attack requires local access to the system but no prior privileges (PR:N), making it accessible to any authenticated user on the host. Exploitation involves dropping a malicious executable in a writable directory within the unquoted path; upon service restart or system reboot, the service executes the attacker's binary with SYSTEM-level privileges. This achieves high-impact confidentiality, integrity, and availability effects, potentially leading to full system compromise, persistence, or lateral movement.

Advisories and references provide further details on the issue, including a proof-of-concept exploit published on Exploit-DB (https://www.exploit-db.com/exploits/50902) and a VulnCheck advisory (https://www.vulncheck.com/advisories/tcq-itecproteccioappserverexe-unquoted-service-path). The vendor's program page is available at https://itec.es/programas/. No specific patch or mitigation steps are detailed in the provided information.

A publicly available exploit on Exploit-DB indicates active interest and potential for real-world exploitation in environments running the affected ITeCProteccioAppServer.

Details

CWE(s)

Affected Products

Itec
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2019-25276Shared CWE-428
CVE-2020-37098Shared CWE-428
CVE-2021-47809Shared CWE-428
CVE-2024-57276Shared CWE-428
CVE-2020-37100Shared CWE-428
CVE-2021-47790Shared CWE-428
CVE-2020-36976Shared CWE-428
CVE-2021-47787Shared CWE-428
CVE-2021-47833Shared CWE-428
CVE-2021-47861Shared CWE-428

References