


Perceptive Security
SOC/SIEM Consultancy

SysGauge Server 7.9.18 contains an unquoted service path vulnerability in its binary path configuration that allows local attackers to potentially execute arbit…
Published:
15 januari 2026 om 23:00:00
Alert date:
16 januari 2026 om 16:17:23
Source:
nvd.nist.gov
Operating Systems, Enterprise Applications
CVE-2020-36930 affects SysGauge Server version 7.9.18 with an unquoted service path vulnerability. The vulnerability exists in the binary path configuration allowing local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path 'C:\Program Files\SysGauge Server\bin\sysgaus.exe' to inject malicious executables. This enables privilege escalation attacks on affected systems. The vulnerability requires local access to exploit but can lead to complete system compromise.
Technical details
Mitigation steps:
Affected products:
SysGauge Server
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2020-36930
https://www.exploit-db.com/exploits/50009
https://www.sysgauge.com
https://www.vulncheck.com/advisories/sysgauge-sysgauge-server-unquoted-service-path
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
