Cyber Posture

CVE-2020-36927

HighPublic PoC

Published: 16 January 2026

Published
16 January 2026
Modified
09 February 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-36927 is a high-severity Unquoted Search Path or Element (CWE-428) vulnerability in Flexense Diskpulse. Its CVSS base score is 7.8 (High).

Operationally, ranked at the 0.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and RA-5 (Vulnerability Monitoring and Scanning).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the unquoted service path flaw by identifying, prioritizing, and correcting the vulnerable service configuration or patching the DiskPulse Enterprise software.

prevent

Enforces secure baseline configuration settings for system services, including proper quoting of executable paths like 'C:\Program Files\Disk Pulse Enterprise\bin\diskpls.exe' to prevent path hijacking.

detect

Vulnerability scanning detects unquoted service path issues in Windows services such as the DiskPulse Enterprise service, enabling timely identification and remediation.

NVD Description

DiskPulse Enterprise 13.6.14 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in 'C:\Program Files\Disk Pulse Enterprise\bin\diskpls.exe' to inject malicious executables and escalate…

more

privileges.

Deeper analysisAI

CVE-2020-36927 is an unquoted service path vulnerability in DiskPulse Enterprise 13.6.14. The issue affects the Windows service configuration, specifically the unquoted path 'C:\Program Files\Disk Pulse Enterprise\bin\diskpls.exe'. This flaw, classified under CWE-428, enables local attackers to potentially execute arbitrary code by exploiting the lack of quotes around the service binary path.

A local attacker with low privileges (AV:L/AC:L/PR:L) can exploit the vulnerability by placing a malicious executable in an intermediate directory along the service path, such as C:\Program Files\. When the service starts or restarts, it may execute the attacker's binary instead of the legitimate one, resulting in arbitrary code execution and privilege escalation. The vulnerability yields high impacts on confidentiality, integrity, and availability, as reflected in its CVSS v3.1 base score of 7.8 (S:U/C:H/I:H/A:H).

Advisories and additional resources are available from the vendor at https://www.diskpulse.com, VulnCheck at https://www.vulncheck.com/advisories/diskpulse-unquoted-service-path, and Exploit-DB at https://www.exploit-db.com/exploits/50012, which includes a proof-of-concept exploit. No specific patch or mitigation details are detailed in the primary CVE information.

Details

CWE(s)

Affected Products

flexense
diskpulse
13.6.14

CVEs Like This One

CVE-2021-47809Same vendor: Flexense
CVE-2020-37100Same vendor: Flexense
CVE-2025-59893Same product: Flexense Diskpulse
CVE-2021-47807Same vendor: Flexense
CVE-2020-36930Same vendor: Flexense
CVE-2025-59891Same product: Flexense Diskpulse
CVE-2021-47806Same vendor: Flexense
CVE-2025-59894Same product: Flexense Diskpulse
CVE-2025-59895Same product: Flexense Diskpulse
CVE-2025-59892Same product: Flexense Diskpulse

References