top of page
perceptive_background_267k.jpg

SysGauge Server 7.9.18 contains an unquoted service path vulnerability in its binary path configuration that allows local attackers to potentially execute arbit…

Published:

15 January 2026 at 23:00:00

Alert date:

16 January 2026 at 16:17:23

Source:

nvd.nist.gov

Click to open the original link from this advisory

Operating Systems, Enterprise Applications

CVE-2020-36930 affects SysGauge Server version 7.9.18 with an unquoted service path vulnerability. The vulnerability exists in the binary path configuration allowing local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path 'C:\Program Files\SysGauge Server\bin\sysgaus.exe' to inject malicious executables. This enables privilege escalation attacks on affected systems. The vulnerability requires local access to exploit but can lead to complete system compromise.

Technical details

Mitigation steps:

Affected products:

SysGauge Server

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page