Cyber Posture

CVE-2022-50935

CriticalPublic PoC

Published: 13 January 2026

Published
13 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 19.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2022-50935 is a critical-severity Unquoted Search Path or Element (CWE-428) vulnerability. Its CVSS base score is 9.8 (Critical).

Operationally, ranked at the 19.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-10 (Software Usage Restrictions) and CM-6 (Configuration Settings).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces and documents secure configuration settings for Windows services, including proper quoting of executable paths like 'C:\Program Files (x86)\Internet Telcel\ApplicationController.exe' to directly prevent unquoted path hijacking.

prevent

Implements application whitelisting with deny-by-default policy to block execution of unauthorized malicious executables placed to exploit the unquoted service path vulnerability.

prevent

Mandates timely identification, reporting, and remediation of flaws such as the unquoted service path in the Flame II HSPA USB Modem software to eliminate the vulnerability.

NVD Description

Flame II HSPA USB Modem contains an unquoted service path vulnerability in its Windows service configuration. Attackers can exploit the unquoted path in 'C:\Program Files (x86)\Internet Telcel\ApplicationController.exe' to execute arbitrary code with elevated system privileges.

Deeper analysisAI

CVE-2022-50935 is an unquoted service path vulnerability (CWE-428) in the Windows service configuration of the Flame II HSPA USB Modem, specifically affecting the path 'C:\Program Files (x86)\Internet Telcel\ApplicationController.exe'. This flaw allows the service binary path to be exploited due to improper quoting, enabling attackers to hijack the service execution. The vulnerability has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity with high impact on confidentiality, integrity, and availability.

Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. By placing a malicious executable in a location that the unquoted path traversal would resolve to before the legitimate binary, attackers can achieve arbitrary code execution with elevated SYSTEM privileges on the target Windows system hosting the modem driver or service.

Advisories and related resources, including the VulnCheck advisory at https://www.vulncheck.com/advisories/flame-ii-modem-usb-unquoted-service-path and an exploit proof-of-concept at https://www.exploit-db.com/exploits/50708, provide further technical details. The original product page is archived at https://web.archive.org/web/20160402093509/https://www.telcel.com/personas/equipos/modems-usb/alcatel/x602a. No specific patches are detailed in the provided information, but practitioners should isolate affected modems, reconfigure services with quoted paths, or remove the software where possible.

Details

CWE(s)

CVEs Like This One

CVE-2019-25276Shared CWE-428
CVE-2020-37098Shared CWE-428
CVE-2021-47809Shared CWE-428
CVE-2024-57276Shared CWE-428
CVE-2020-37100Shared CWE-428
CVE-2021-47790Shared CWE-428
CVE-2020-36976Shared CWE-428
CVE-2021-47787Shared CWE-428
CVE-2021-47833Shared CWE-428
CVE-2021-47861Shared CWE-428

References