<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Unquoted-Service-Path — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/unquoted-service-path/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 04 Apr 2026 14:16:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/unquoted-service-path/feed.xml" rel="self" type="application/rss+xml"/><item><title>Sheed AntiVirus Unquoted Service Path Privilege Escalation (CVE-2016-20061)</title><link>https://feed.craftedsignal.io/briefs/2026-04-sheed-antivirus-privesc/</link><pubDate>Sat, 04 Apr 2026 14:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sheed-antivirus-privesc/</guid><description>Sheed AntiVirus 2.3 contains an unquoted service path vulnerability in the ShavProt service that allows local attackers to escalate privileges by placing a malicious executable in the unquoted path, leading to arbitrary code execution as LocalSystem.</description><content:encoded><![CDATA[<p>Sheed AntiVirus 2.3 is vulnerable to an unquoted service path vulnerability (CVE-2016-20061) affecting the ShavProt service. This vulnerability, disclosed in April 2026, allows a local attacker with limited privileges to escalate their privileges to SYSTEM. The attack involves placing a malicious executable in a directory within the unquoted service path. When the ShavProt service starts (either through a service restart or system reboot), it attempts to execute binaries along the unquoted path. If the attacker-controlled malicious executable is encountered first, it will be executed with LocalSystem privileges. This poses a significant risk as it allows attackers to gain complete control over the affected system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the unquoted service path for the ShavProt service in Sheed AntiVirus 2.3. This path is typically found in the Windows Registry under <code>HKLM\SYSTEM\CurrentControlSet\Services\ShavProt\ImagePath</code>.</li>
<li>The attacker crafts a malicious executable (e.g., <code>evil.exe</code>) designed to perform actions with elevated privileges (e.g., creating a new administrator account or disabling security features).</li>
<li>The attacker places the malicious executable (<code>evil.exe</code>) in a directory along the unquoted service path, ensuring it is named to match a directory name within the path. For example, if the path is <code>C:\Program Files\Sheed AntiVirus\ShavProt.exe</code>, they might create a directory named &ldquo;Program&rdquo; and place <code>evil.exe</code> in <code>C:\evil.exe</code>. This will make the system attempt to execute <code>C:\evil.exe Files\Sheed AntiVirus\ShavProt.exe</code>.</li>
<li>The attacker triggers a restart of the ShavProt service. This can be achieved using the <code>net stop</code> and <code>net start</code> commands, or through the Services management console (<code>services.msc</code>).</li>
<li>Alternatively, the attacker can induce a system reboot to trigger the service to start automatically.</li>
<li>As the service starts, Windows attempts to execute the ShavProt service binary, but due to the unquoted path, it first executes the attacker&rsquo;s malicious executable (<code>evil.exe</code>) with LocalSystem privileges.</li>
<li>The malicious executable performs its intended actions, such as creating a new administrator account, modifying system files, or installing backdoors.</li>
<li>The attacker now has persistent access to the system with LocalSystem privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to gain complete control over the affected system. This can lead to sensitive data theft, installation of malware, disruption of services, and potential compromise of the entire network if the attacker pivots to other systems. The vulnerability affects all installations of Sheed AntiVirus 2.3, potentially impacting a wide range of users if the antivirus is still deployed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or upgrades for Sheed AntiVirus. If no patch is available, consider uninstalling the software.</li>
<li>Monitor process creation events for execution of binaries from unusual paths that coincide with unquoted service paths as a generic preventative measure using the &ldquo;Detect Suspicious Process Creation in Unquoted Path&rdquo; Sigma rule.</li>
<li>Monitor service creation events (if possible via endpoint detection) for services with unquoted paths.</li>
<li>Block the download URL <code>http://dl.sheedantivirus.ir/setup.exe</code> at the network perimeter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>unquoted-service-path</category><category>cve-2016-20061</category></item><item><title>Potential Exploitation of an Unquoted Service Path Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-unquoted-service-path/</link><pubDate>Mon, 29 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-unquoted-service-path/</guid><description>This rule detects potential exploitation of unquoted service path vulnerabilities, where adversaries may escalate privileges by placing a malicious executable in a higher-level directory within the path of an unquoted service executable.</description><content:encoded><![CDATA[<p>Unquoted service paths in Windows can be exploited to escalate privileges. When a service path lacks quotes, Windows may execute a malicious executable placed in a higher-level directory. This detection rule identifies suspicious processes starting from common unquoted paths, like &ldquo;C:\Program.exe&rdquo; or executables within &ldquo;C:\Program Files (x86)\&rdquo; or &ldquo;C:\Program Files\&rdquo;, signaling potential exploitation attempts. The rule aims to detect early stages of privilege escalation threats. This rule is designed for data generated by Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, Windows Security Event Logs, and Crowdstrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a service running with an unquoted path, such as &ldquo;C:\Program Files\Unquoted Path Service\Common\Service.exe&rdquo;.</li>
<li>The attacker places a malicious executable named &ldquo;Program.exe&rdquo; in &ldquo;C:&quot;</li>
<li>The operating system attempts to start the service &ldquo;C:\Program Files\Unquoted Path Service\Common\Service.exe&rdquo;.</li>
<li>Due to the unquoted path, the OS incorrectly parses the path and first attempts to execute &ldquo;C:\Program.exe&rdquo;.</li>
<li>The malicious &ldquo;Program.exe&rdquo; executes with the privileges of the service account.</li>
<li>The malicious executable performs actions to escalate privileges, such as adding a user to the local administrators group.</li>
<li>The attacker gains elevated access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of an unquoted service path vulnerability can lead to complete system compromise, as the attacker gains the privileges of the service account. This can allow the attacker to install programs, view, change, or delete data, or create new accounts with full user rights. The impact is high, potentially leading to a loss of confidentiality, integrity, and availability of the affected system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review process executable paths to confirm if they match the patterns specified in the rule query, such as &ldquo;?:\Program.exe&rdquo; or executables within &ldquo;C:\Program Files (x86)\&rdquo; or &ldquo;C:\Program Files\&rdquo;.</li>
<li>Deploy the Sigma rule &ldquo;Potential Exploitation of an Unquoted Service Path Vulnerability&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process-creation logging with Event ID 1 to activate the Sigma rules above.</li>
<li>Conduct a thorough review of service configurations to identify and correct any unquoted service paths as part of remediation steps.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privilege-escalation</category><category>unquoted-service-path</category><category>windows</category></item></channel></rss>