


Perceptive Security
SOC/SIEM Consultancy

DiskPulse Enterprise 13.6.14 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially exe…
Published:
15 January 2026 at 23:00:00
Alert date:
16 January 2026 at 16:17:23
Source:
nvd.nist.gov
Operating Systems, Enterprise Applications
CVE-2020-36927 affects DiskPulse Enterprise version 13.6.14, containing an unquoted service path vulnerability in its Windows service configuration. The vulnerability exists in the path 'C:\Program Files\Disk Pulse Enterprise\bin\diskpls.exe' where the unquoted spaces allow local attackers to inject malicious executables. Successful exploitation enables arbitrary code execution and privilege escalation on the affected system. This is a local privilege escalation vulnerability that requires initial access to the system. The vulnerability demonstrates how improper service path configuration can lead to security compromises in Windows environments.
Technical details
Mitigation steps:
Affected products:
DiskPulse Enterprise
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2020-36927
https://www.diskpulse.com
https://www.exploit-db.com/exploits/50012
https://www.vulncheck.com/advisories/diskpulse-unquoted-service-path
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
