CVE-2020-36990

HIGH

Input Director 1.4.3 - Privilege Escalation

Title source: llm
STIX 2.1

Description

Input Director 1.4.3 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to execute code with elevated privileges. Attackers can exploit the unquoted path during system startup or reboot to inject and run malicious executables with LocalSystem permissions.

Exploits (1)

exploitdb WRITEUP
by TOUHAMI Kasbaoui · textlocalwindows
https://www.exploit-db.com/exploits/48795

Scores

CVSS v3 7.8
EPSS 0.0001
EPSS Percentile 0.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-428
Status published
Products (1)
Inputdirector/Input Director 1.4.3
Published Jan 28, 2026
Tracked Since Feb 18, 2026