<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Privacy Drive 3.17.0 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/privacy-drive-3.17.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:18:20 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/privacy-drive-3.17.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>Privacy Drive 3.17.0 Unquoted Service Path Privilege Escalation (CVE-2020-37231)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37231-privacy-drive-unquoted-path/</link><pubDate>Sat, 16 May 2026 16:18:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37231-privacy-drive-unquoted-path/</guid><description>Privacy Drive 3.17.0 contains an unquoted service path vulnerability in the pdsvc.exe service, allowing local attackers to escalate privileges by placing malicious executables in the unquoted path directories, leading to arbitrary code execution with LocalSystem privileges.</description><content:encoded><![CDATA[<p>Cybertron Soft&rsquo;s Privacy Drive version 3.17.0 is vulnerable to an unquoted service path vulnerability (CVE-2020-37231) affecting the <code>pdsvc.exe</code> service. This flaw allows a local attacker with limited privileges to escalate their privileges to SYSTEM. The vulnerability exists because the service&rsquo;s executable path contains spaces and lacks proper quoting, which can lead to Windows executing unintended binaries located in the service&rsquo;s path. An attacker can leverage this by placing a malicious executable in a directory within the unquoted path. When the system or service restarts, the malicious executable is executed with SYSTEM privileges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the unquoted service path for the <code>pdsvc.exe</code> service.</li>
<li>The attacker determines a directory in the unquoted service path where they can place files.</li>
<li>The attacker crafts a malicious executable (e.g., <code>program.exe</code>).</li>
<li>The attacker renames the malicious executable to match a portion of the unquoted service path, such as the first word in the full path (e.g., if the path is &ldquo;C:\Program Files\Privacy Drive\pdsvc.exe&rdquo;, the attacker might name their executable &ldquo;Program.exe&rdquo;).</li>
<li>The attacker places the renamed malicious executable in the accessible directory within the unquoted path (e.g., <code>C:\</code>).</li>
<li>The attacker triggers a service restart or system reboot.</li>
<li>During service startup, Windows attempts to execute the service binary using the unquoted path, but instead executes the malicious executable placed in the earlier steps.</li>
<li>The malicious executable runs with SYSTEM privileges, granting the attacker elevated access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful exploit allows a local attacker to gain complete control over the affected system. The attacker can install programs, view, change, or delete data, or create new accounts with full user rights. This vulnerability poses a significant risk to systems where Privacy Drive 3.17.0 is installed, especially in environments where multiple user accounts exist or where sensitive data is stored.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the Sigma rule <code>Detect Unquoted Service Path Exploitation</code> to identify potential attempts to exploit unquoted service paths by monitoring process creation events.</li>
<li>Apply the Sigma rule <code>Detect Privacy Drive Service Execution from Unusual Location</code> to detect if the <code>pdsvc.exe</code> service is executed from an unexpected location, which could indicate exploitation.</li>
<li>Follow remediation steps provided by Cybertron Soft to properly quote the service path or upgrade to a patched version of Privacy Drive, when available.</li>
<li>Review service configurations for other unquoted service paths to prevent similar privilege escalation attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege escalation</category><category>unquoted service path</category><category>cve-2020-37231</category></item></channel></rss>