Impact
Installers for Soliton SecureBrowser II, SecureBrowser for OneGate, and SecureWorkspace contain incorrect default permissions that can be leveraged by an attacker to execute arbitrary code with SYSTEM privileges. The weakness corresponds to CWE‑276 (Incorrect Permission Assignment) and CWE‑863 (Insufficient or Incorrect Permission Enforcement). As a result, a malicious actor could gain full control of the affected Windows machine if they can run a malicious component during or after installation.
Affected Systems
The vulnerability affects Soliton Systems K.K. products: SecureBrowser II, SecureBrowser for OneGate, and SecureWorkspace (formerly WrappingBox). All products available on Windows platforms are susceptible; specific versions are not enumerated in the advisory, so any installation build should be considered vulnerable until a patch is applied.
Risk and Exploitability
The CVSS score of 5.4 indicates moderate severity, and the EPSS score of less than 1% suggests that exploitation is unlikely but not impossible. The vulnerability is not listed in the CISA KEV catalog, so it is not known to have been actively exploited in the wild. The attack vector is inferred to be the installation process; an attacker who can influence the installer—directly or via a compromised installation medium—could trigger the misconfigured permissions and achieve privilege escalation.
OpenCVE Enrichment