<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2020-37223 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2020-37223/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:30:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2020-37223/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2020-37223 - IObit Uninstaller Unquoted Service Path Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37223-iobit-uninstaller-unquoted-service-path/</link><pubDate>Wed, 13 May 2026 16:30:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37223-iobit-uninstaller-unquoted-service-path/</guid><description>IObit Uninstaller 9.5.0.15 contains an unquoted service path vulnerability in the IObitUnSvr service, allowing local attackers to escalate privileges to SYSTEM by placing a malicious executable in the service's path.</description><content:encoded><![CDATA[<p>IObit Uninstaller version 9.5.0.15 is vulnerable to an unquoted service path vulnerability (CVE-2020-37223) affecting the IObitUnSvr service. This flaw enables a local attacker to achieve SYSTEM-level privilege escalation. The vulnerability stems from the lack of proper quoting around the service&rsquo;s executable path, which allows the operating system to misinterpret the path and execute arbitrary code from attacker-controlled locations. This vulnerability was reported on May 13, 2026, and is considered a high-severity issue due to its potential for complete system compromise. Successful exploitation requires the attacker to have local access to the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains local access to the target system.</li>
<li>Attacker identifies the vulnerable service, IObitUnSvr, and its unquoted service path.</li>
<li>Attacker places a malicious executable named <code>IObit.exe</code> in the <code>C:\Program Files (x86)\IObit</code> directory.</li>
<li>Attacker restarts the <code>IObitUnSvr</code> service. This can be achieved through the Services control panel (<code>services.msc</code>) or via command-line tools like <code>net stop IObitUnSvr</code> followed by <code>net start IObitUnSvr</code>.</li>
<li>Due to the unquoted service path, when the service attempts to start, Windows executes the attacker-controlled <code>IObit.exe</code> with SYSTEM privileges.</li>
<li>The malicious <code>IObit.exe</code> performs actions as the SYSTEM user, granting the attacker elevated control over the system.</li>
<li>Attacker leverages elevated privileges to install malware, modify system configurations, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to escalate their privileges to SYSTEM. This can lead to complete compromise of the affected system, allowing the attacker to install programs, view, change, or delete data, or create new accounts with full administrative rights. There is no specific information about observed damage or targeted sectors included in this report.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the Sigma rule <code>Detect IObit Uninstaller Unquoted Service Path Privilege Escalation</code> to detect the creation of a malicious executable named <code>IObit.exe</code> in the <code>C:\Program Files (x86)\IObit</code> directory.</li>
<li>Apply the Sigma rule <code>Detect IObitUnSvr Service Start with Malicious Executable</code> to detect when the <code>IObitUnSvr</code> service starts a malicious executable due to the unquoted service path.</li>
<li>Upgrade IObit Uninstaller to a version that addresses CVE-2020-37223.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>unquoted service path</category><category>cve-2020-37223</category></item></channel></rss>