<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Kite — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/kite/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:19:44 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/kite/feed.xml" rel="self" type="application/rss+xml"/><item><title>Kite Unquoted Service Path Vulnerability (CVE-2020-37247)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37247/</link><pubDate>Sat, 16 May 2026 16:19:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37247/</guid><description>Kite 4.2.0.1 U1 contains an unquoted service path vulnerability (CVE-2020-37247) in the KiteService Windows service that allows local attackers to escalate privileges by placing a malicious executable in a directory due to the unquoted service path.</description><content:encoded><![CDATA[<p>Kite 4.2.0.1 U1 suffers from an unquoted service path vulnerability within its KiteService Windows service. This weakness allows a local attacker with low privileges to escalate their privileges to LocalSystem. By exploiting the unquoted service path, an attacker can insert a malicious executable into a directory that is part of the service&rsquo;s execution path. When the KiteService service starts, it will inadvertently execute the attacker-controlled binary with elevated privileges, granting the attacker full control over the system. This vulnerability has been assigned CVE-2020-37247.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains low-privilege access to the target Windows system.</li>
<li>Attacker identifies the vulnerable KiteService service with an unquoted path.</li>
<li>Attacker analyzes the service path to identify directories where they can write files.</li>
<li>Attacker crafts a malicious executable, named to match an expected part of the unquoted path (e.g., &ldquo;Program.exe&rdquo; if the path is &ldquo;C:\Program Files\Kite\Program Files\KiteService.exe&rdquo;).</li>
<li>Attacker places the malicious executable in a directory within the service&rsquo;s path (e.g., C:\Program Files\Kite).</li>
<li>Attacker triggers a restart of the KiteService service (e.g., by rebooting the machine or stopping/starting the service).</li>
<li>Windows attempts to execute the KiteService service. Due to the unquoted path, it first executes the attacker&rsquo;s malicious executable with LocalSystem privileges.</li>
<li>The attacker&rsquo;s executable performs privileged actions, effectively escalating the attacker&rsquo;s privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this unquoted service path vulnerability allows a local attacker to escalate their privileges to LocalSystem. This grants the attacker complete control over the compromised system, allowing them to install software, modify data, and create new accounts with full administrative rights. The CVE has a CVSS v3.1 score of 7.8, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Unquoted Service Path Exploitation</code> to your SIEM and tune for your environment to identify potential exploitation attempts.</li>
<li>Apply the official patch from Kite (if available) to remediate the unquoted service path vulnerability described in CVE-2020-37247.</li>
<li>Monitor process creation events for the execution of unexpected executables from directories within the unquoted service path, as described in the attack chain.</li>
<li>Implement application control policies to restrict the execution of unauthorized executables within directories commonly affected by unquoted service path vulnerabilities (e.g., C:\Program Files, C:\Program Files (x86)).</li>
<li>Use the <code>Get-Service</code> PowerShell cmdlet to identify services with unquoted paths in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>privilege-escalation</category><category>unquoted service path</category><category>cve-2020-37247</category><category>windows</category></item></channel></rss>