<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>LegionSpace (1.7.11.2) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/legionspace-1.7.11.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 13:32:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/legionspace-1.7.11.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>Lenovo LegionSpace 1.7.11.2 Unquoted Service Path Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-lenovo-legionspace-unquoted-service-path/</link><pubDate>Thu, 21 May 2026 13:32:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-lenovo-legionspace-unquoted-service-path/</guid><description>A local exploit has been published for Lenovo LegionSpace 1.7.11.2, detailing an Unquoted Service Path vulnerability in the 'DAService', potentially leading to local privilege escalation.</description><content:encoded><![CDATA[<p>A local privilege escalation vulnerability exists in Lenovo LegionSpace version 1.7.11.2 due to an unquoted service path in the &lsquo;DAService&rsquo;. This flaw allows a local attacker to insert arbitrary code into a path within the service&rsquo;s execution path. When the &lsquo;DAService&rsquo; starts, it attempts to execute the program specified in its path. If the path is unquoted and contains spaces, the service may inadvertently execute a malicious program placed in an earlier directory in the path. The exploit, identified as EDB-52570, was published on Exploit-DB on 2026-05-21. Successful exploitation leads to arbitrary code execution with elevated privileges. Lenovo recommends upgrading to version 1.8.12.13 or later to mitigate this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an unquoted service path for &lsquo;DAService&rsquo;: C:\Program Files\Lenovo\LegionSpace\1.7.11.2\LSDaemon.exe.</li>
<li>The attacker creates a malicious executable named &ldquo;Program.exe&rdquo; in C:.</li>
<li>The operating system attempts to start the &lsquo;DAService&rsquo;. Due to the unquoted path, the OS parses the path as C:\Program.exe instead of C:\Program Files\Lenovo\LegionSpace\1.7.11.2\LSDaemon.exe.</li>
<li>The malicious &ldquo;Program.exe&rdquo; is executed.</li>
<li>The malicious executable runs with the privileges of the &lsquo;DAService&rsquo;, which is LocalSystem.</li>
<li>The attacker gains elevated privileges on the system.</li>
<li>The attacker can now perform administrative tasks or install malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code with elevated privileges. This can lead to a complete compromise of the affected system, including data theft, malware installation, and denial of service. Given the widespread use of Lenovo LegionSpace software, a significant number of systems are potentially vulnerable if not patched.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Lenovo LegionSpace to version 1.8.12.13 or later to patch the unquoted service path vulnerability as recommended by the vendor.</li>
<li>Deploy the Sigma rule &ldquo;Detect Unquoted Service Path Exploitation&rdquo; to identify attempts to exploit this vulnerability by monitoring for the creation of files in the root directory with names matching components of the vulnerable service path.</li>
<li>Regularly review service configurations for unquoted paths using the <code>wmic service get name, pathname, displayname, startmode</code> command.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>unquoted-service-path</category><category>privilege-escalation</category><category>windows</category></item></channel></rss>