Impact
An unquoted service path in the SpyEmrgHealth and SpyEmrgSrv services allows a local user to place a malicious executable in the folder referenced by the path and to trigger the service to restart or the system to reboot. When the service or system restarts, the executable runs with LocalSystem privileges, giving the attacker full control of the machine.
Affected Systems
The flaw is present in Spy Emergency build 23.0.205; no other builds are listed as affected. The services involved are SpyEmrgHealth and SpyEmrgSrv.
Risk and Exploitability
The CVSS base score of 8.5 indicates a severe vulnerability. No exploitable payloads are publicly documented in the KEV catalog, and an EPSS value is not available, but the local nature of the attack means that any user with the ability to stop the service or reboot the machine can easily trigger the exploit. Once executed, the attacker gains full system rights, compromising confidentiality, integrity, and availability.
OpenCVE Enrichment