CVE-2020-36930
Published: 16 January 2026
Summary
CVE-2020-36930 is a high-severity Unquoted Search Path or Element (CWE-428) vulnerability in Flexense Sysgauge. Its CVSS base score is 7.8 (High).
Operationally, ranked at the 0.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
CM-6 mandates secure configuration settings for system components, directly preventing exploitation by requiring quoted service binary paths as in CVE-2020-36930.
SI-2 requires identification and correction of flaws like the unquoted service path in SysGauge Server, enabling patching or manual remediation.
AC-6 enforces least privilege for services, limiting privilege escalation damage if malicious code executes via the unquoted path in CVE-2020-36930.
NVD Description
SysGauge Server 7.9.18 contains an unquoted service path vulnerability in its binary path configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in 'C:\Program Files\SysGauge Server\bin\sysgaus.exe' to inject malicious executables and escalate privileges.
Deeper analysisAI
CVE-2020-36930 affects SysGauge Server version 7.9.18 and involves an unquoted service path vulnerability in the binary path configuration for 'C:\Program Files\SysGauge Server\bin\sysgaus.exe'. This issue, mapped to CWE-428, enables local attackers to potentially execute arbitrary code by exploiting the unquoted path. The vulnerability carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-01-16.
Local attackers with low privileges can exploit this vulnerability by placing malicious executables in directories searched prior to the legitimate binary path. When the SysGauge service starts or restarts, it may execute the injected code instead, allowing privilege escalation.
Advisories and references include a proof-of-concept exploit at https://www.exploit-db.com/exploits/50009, the vendor site at https://www.sysgauge.com, and a VulnCheck advisory at https://www.vulncheck.com/advisories/sysgauge-sysgauge-server-unquoted-service-path. Security practitioners should review these sources for detailed mitigation guidance.
Details
- CWE(s)