SAntivirus IC 10.0.21.61 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted executable path to inject malicious files in the service binary path, enabling privilege escalation to system-level permissions.
Metrics
Affected Vendors & Products
References
History
Tue, 27 Jan 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SAntivirus IC 10.0.21.61 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted executable path to inject malicious files in the service binary path, enabling privilege escalation to system-level permissions. | |
| Title | SAntivirus IC 10.0.21.61 - 'SAntivirusIC' Unquoted Service Path | |
| Weaknesses | CWE-428 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-27T18:51:04.921Z
Reserved: 2026-01-27T15:47:07.999Z
Link: CVE-2020-36980
No data.
Status : Received
Published: 2026-01-27T19:16:10.947
Modified: 2026-01-27T19:16:10.947
Link: CVE-2020-36980
No data.
OpenCVE Enrichment
No data.