CVE-2020-36980

HIGH

SAntivirus IC <10.0.21.61 - Code Injection

Title source: llm
STIX 2.1

Description

SAntivirus IC 10.0.21.61 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted executable path to inject malicious files in the service binary path, enabling privilege escalation to system-level permissions.

Exploits (1)

exploitdb WRITEUP
by Mara Ramirez · textlocalwindows
https://www.exploit-db.com/exploits/49042

Scores

CVSS v3 7.8
EPSS 0.0002
EPSS Percentile 3.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-428
Status published
Products (1)
Segurazo/SAntivirus IC 10.0.21.61
Published Jan 27, 2026
Tracked Since Feb 18, 2026