top of page
perceptive_background_267k.jpg

DiskPulse Enterprise 13.6.14 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially exe…

Published:

15 January 2026 at 23:00:00

Alert date:

16 January 2026 at 16:17:23

Source:

nvd.nist.gov

Click to open the original link from this advisory

Operating Systems, Enterprise Applications

CVE-2020-36927 affects DiskPulse Enterprise version 13.6.14, containing an unquoted service path vulnerability in its Windows service configuration. The vulnerability exists in the path 'C:\Program Files\Disk Pulse Enterprise\bin\diskpls.exe' where the unquoted spaces allow local attackers to inject malicious executables. Successful exploitation enables arbitrary code execution and privilege escalation on the affected system. This is a local privilege escalation vulnerability that requires initial access to the system. The vulnerability demonstrates how improper service path configuration can lead to security compromises in Windows environments.

Technical details

Mitigation steps:

Affected products:

DiskPulse Enterprise

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page