Windows Unquoted Path Vulnerability 1.3.6.1.4.1.25623.1.0.107303

This test reports a sever vulnerability even if the unquoted path does not contain a space. The vulnerability is when the unquoted path contains a space. I have been unable to find which nasl script performs this test (lack of linux find/grep skills).

Can this script be modified to report vulnerability only if path contains a space and informational if it does not?

This is /opt/greenbone/feed/plugins/2018/gb_unquoted_path_vulnerabilities_win.nasl.

I also discovered that the registry path reported was in HKLM\SYSTEM\Setup\FirstBoot\Servcies
and was for a version of the application that had been upgraded. The registry value in the HKLM\SYSTEM\CurrentControlSet\Services for the service in question was properly quoted.

This issue looks like it can be resolved by removing the obsolete entry from the Setup section of the Hive.

Regards,