SAntivirus IC 10.0.21.61 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted executable path to inject malicious files in the service binary path, enabling privilege escalation to system-level permissions.
Metrics
Affected Vendors & Products
References
History
Wed, 28 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Segurazo
Segurazo santivirus Ic |
|
| Vendors & Products |
Segurazo
Segurazo santivirus Ic |
Tue, 27 Jan 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SAntivirus IC 10.0.21.61 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted executable path to inject malicious files in the service binary path, enabling privilege escalation to system-level permissions. | |
| Title | SAntivirus IC 10.0.21.61 - 'SAntivirusIC' Unquoted Service Path | |
| Weaknesses | CWE-428 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-27T18:51:04.921Z
Reserved: 2026-01-27T15:47:07.999Z
Link: CVE-2020-36980
No data.
Status : Received
Published: 2026-01-27T19:16:10.947
Modified: 2026-01-27T19:16:10.947
Link: CVE-2020-36980
No data.