SAntivirus IC 10.0.21.61 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted executable path to inject malicious files in the service binary path, enabling privilege escalation to system-level permissions.
History

Tue, 27 Jan 2026 19:00:00 +0000

Type Values Removed Values Added
Description SAntivirus IC 10.0.21.61 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted executable path to inject malicious files in the service binary path, enabling privilege escalation to system-level permissions.
Title SAntivirus IC 10.0.21.61 - 'SAntivirusIC' Unquoted Service Path
Weaknesses CWE-428
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-27T18:51:04.921Z

Reserved: 2026-01-27T15:47:07.999Z

Link: CVE-2020-36980

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-27T19:16:10.947

Modified: 2026-01-27T19:16:10.947

Link: CVE-2020-36980

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.