<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2016-20061 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2016-20061/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 04 Apr 2026 14:16:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2016-20061/feed.xml" rel="self" type="application/rss+xml"/><item><title>Sheed AntiVirus Unquoted Service Path Privilege Escalation (CVE-2016-20061)</title><link>https://feed.craftedsignal.io/briefs/2026-04-sheed-antivirus-privesc/</link><pubDate>Sat, 04 Apr 2026 14:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sheed-antivirus-privesc/</guid><description>Sheed AntiVirus 2.3 contains an unquoted service path vulnerability in the ShavProt service that allows local attackers to escalate privileges by placing a malicious executable in the unquoted path, leading to arbitrary code execution as LocalSystem.</description><content:encoded><![CDATA[<p>Sheed AntiVirus 2.3 is vulnerable to an unquoted service path vulnerability (CVE-2016-20061) affecting the ShavProt service. This vulnerability, disclosed in April 2026, allows a local attacker with limited privileges to escalate their privileges to SYSTEM. The attack involves placing a malicious executable in a directory within the unquoted service path. When the ShavProt service starts (either through a service restart or system reboot), it attempts to execute binaries along the unquoted path. If the attacker-controlled malicious executable is encountered first, it will be executed with LocalSystem privileges. This poses a significant risk as it allows attackers to gain complete control over the affected system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the unquoted service path for the ShavProt service in Sheed AntiVirus 2.3. This path is typically found in the Windows Registry under <code>HKLM\SYSTEM\CurrentControlSet\Services\ShavProt\ImagePath</code>.</li>
<li>The attacker crafts a malicious executable (e.g., <code>evil.exe</code>) designed to perform actions with elevated privileges (e.g., creating a new administrator account or disabling security features).</li>
<li>The attacker places the malicious executable (<code>evil.exe</code>) in a directory along the unquoted service path, ensuring it is named to match a directory name within the path. For example, if the path is <code>C:\Program Files\Sheed AntiVirus\ShavProt.exe</code>, they might create a directory named &ldquo;Program&rdquo; and place <code>evil.exe</code> in <code>C:\evil.exe</code>. This will make the system attempt to execute <code>C:\evil.exe Files\Sheed AntiVirus\ShavProt.exe</code>.</li>
<li>The attacker triggers a restart of the ShavProt service. This can be achieved using the <code>net stop</code> and <code>net start</code> commands, or through the Services management console (<code>services.msc</code>).</li>
<li>Alternatively, the attacker can induce a system reboot to trigger the service to start automatically.</li>
<li>As the service starts, Windows attempts to execute the ShavProt service binary, but due to the unquoted path, it first executes the attacker&rsquo;s malicious executable (<code>evil.exe</code>) with LocalSystem privileges.</li>
<li>The malicious executable performs its intended actions, such as creating a new administrator account, modifying system files, or installing backdoors.</li>
<li>The attacker now has persistent access to the system with LocalSystem privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to gain complete control over the affected system. This can lead to sensitive data theft, installation of malware, disruption of services, and potential compromise of the entire network if the attacker pivots to other systems. The vulnerability affects all installations of Sheed AntiVirus 2.3, potentially impacting a wide range of users if the antivirus is still deployed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or upgrades for Sheed AntiVirus. If no patch is available, consider uninstalling the software.</li>
<li>Monitor process creation events for execution of binaries from unusual paths that coincide with unquoted service paths as a generic preventative measure using the &ldquo;Detect Suspicious Process Creation in Unquoted Path&rdquo; Sigma rule.</li>
<li>Monitor service creation events (if possible via endpoint detection) for services with unquoted paths.</li>
<li>Block the download URL <code>http://dl.sheedantivirus.ir/setup.exe</code> at the network perimeter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>unquoted-service-path</category><category>cve-2016-20061</category></item></channel></rss>