<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>SPSV Port Manager 1.0.41 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/spsv-port-manager-1.0.41/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:17:53 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/spsv-port-manager-1.0.41/feed.xml" rel="self" type="application/rss+xml"/><item><title>OKI sPSV Port Manager Unquoted Service Path Vulnerability (CVE-2020-37229)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37229-unquoted-service-path/</link><pubDate>Sat, 16 May 2026 16:17:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37229-unquoted-service-path/</guid><description>OKI sPSV Port Manager 1.0.41 contains an unquoted service path vulnerability in the sPSVOpLclSrv service, allowing local attackers to escalate privileges by inserting executable files into the unquoted path.</description><content:encoded><![CDATA[<p>OKI sPSV Port Manager 1.0.41 is vulnerable to an unquoted service path vulnerability (CVE-2020-37229). The sPSVOpLclSrv service, due to its unquoted path, allows a local attacker to escalate privileges on the targeted system. This vulnerability enables an attacker to insert and execute arbitrary code with LocalSystem privileges. The exploit typically involves placing a malicious executable in a directory within the service&rsquo;s path, which executes upon service restart or system reboot. This poses a significant risk in environments where the vulnerable software is installed, as it can lead to complete system compromise by a local attacker.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains low-privilege access to the target Windows system.</li>
<li>Attacker identifies the vulnerable service, sPSVOpLclSrv, and its unquoted service path.</li>
<li>Attacker creates a malicious executable (e.g., payload.exe) designed to elevate privileges.</li>
<li>Attacker places the malicious executable in a directory within the unquoted service path (e.g., C:\Program Files\OKI\sPSV Port Manager\payload.exe).</li>
<li>Attacker triggers a restart of the sPSVOpLclSrv service or reboots the system.</li>
<li>The operating system attempts to execute the service using the unquoted path, inadvertently executing the malicious executable placed by the attacker.</li>
<li>The malicious executable runs with LocalSystem privileges, granting the attacker elevated access.</li>
<li>The attacker leverages the elevated privileges to perform malicious actions, such as installing backdoors, creating new user accounts, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this unquoted service path vulnerability (CVE-2020-37229) allows a local attacker to escalate privileges to LocalSystem. This level of access grants the attacker complete control over the compromised system, enabling them to install malware, steal sensitive information, or disrupt critical business operations. The vulnerability affects systems running OKI sPSV Port Manager 1.0.41.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the necessary patch or upgrade to a version of OKI sPSV Port Manager that addresses CVE-2020-37229.</li>
<li>Deploy the Sigma rule &ldquo;Detect Unquoted Service Path Exploitation - OKI sPSV Port Manager&rdquo; to identify potential exploitation attempts by monitoring process creations related to the vulnerable service.</li>
<li>Regularly audit service configurations to identify and remediate unquoted service paths, mitigating this class of vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>unquoted service path</category><category>cve-2020-37229</category><category>windows</category></item></channel></rss>