CVE-2020-37223 - IObit Uninstaller Unquoted Service Path Privilege Escalation
IObit Uninstaller 9.5.0.15 contains an unquoted service path vulnerability in the IObitUnSvr service, allowing local attackers to escalate privileges to SYSTEM by placing a malicious executable in the service's path.
IObit Uninstaller version 9.5.0.15 is vulnerable to an unquoted service path vulnerability (CVE-2020-37223) affecting the IObitUnSvr service. This flaw enables a local attacker to achieve SYSTEM-level privilege escalation. The vulnerability stems from the lack of proper quoting around the service’s executable path, which allows the operating system to misinterpret the path and execute arbitrary code from attacker-controlled locations. This vulnerability was reported on May 13, 2026, and is considered a high-severity issue due to its potential for complete system compromise. Successful exploitation requires the attacker to have local access to the system.
Attack Chain
- Attacker gains local access to the target system.
- Attacker identifies the vulnerable service, IObitUnSvr, and its unquoted service path.
- Attacker places a malicious executable named
IObit.exein theC:\Program Files (x86)\IObitdirectory. - Attacker restarts the
IObitUnSvrservice. This can be achieved through the Services control panel (services.msc) or via command-line tools likenet stop IObitUnSvrfollowed bynet start IObitUnSvr. - Due to the unquoted service path, when the service attempts to start, Windows executes the attacker-controlled
IObit.exewith SYSTEM privileges. - The malicious
IObit.exeperforms actions as the SYSTEM user, granting the attacker elevated control over the system. - Attacker leverages elevated privileges to install malware, modify system configurations, or exfiltrate sensitive data.
Impact
Successful exploitation of this vulnerability allows a local attacker to escalate their privileges to SYSTEM. This can lead to complete compromise of the affected system, allowing the attacker to install programs, view, change, or delete data, or create new accounts with full administrative rights. There is no specific information about observed damage or targeted sectors included in this report.
Recommendation
- Apply the Sigma rule
Detect IObit Uninstaller Unquoted Service Path Privilege Escalationto detect the creation of a malicious executable namedIObit.exein theC:\Program Files (x86)\IObitdirectory. - Apply the Sigma rule
Detect IObitUnSvr Service Start with Malicious Executableto detect when theIObitUnSvrservice starts a malicious executable due to the unquoted service path. - Upgrade IObit Uninstaller to a version that addresses CVE-2020-37223.
Detection coverage 2
Detect IObit Uninstaller Unquoted Service Path Privilege Escalation
highDetects the creation of a malicious executable named IObit.exe in the C:\Program Files (x86)\IObit directory, indicating a potential privilege escalation attempt via unquoted service path (CVE-2020-37223).
Detect IObitUnSvr Service Start with Malicious Executable
highDetects when the IObitUnSvr service starts and executes a malicious executable due to the unquoted service path vulnerability (CVE-2020-37223).
Detection queries are available on the platform. Get full rules →