Cyber Posture

CVE-2020-36930

HighPublic PoC

Published: 16 January 2026

Published
16 January 2026
Modified
09 February 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-36930 is a high-severity Unquoted Search Path or Element (CWE-428) vulnerability in Flexense Sysgauge. Its CVSS base score is 7.8 (High).

Operationally, ranked at the 0.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

CM-6 mandates secure configuration settings for system components, directly preventing exploitation by requiring quoted service binary paths as in CVE-2020-36930.

prevent

SI-2 requires identification and correction of flaws like the unquoted service path in SysGauge Server, enabling patching or manual remediation.

prevent

AC-6 enforces least privilege for services, limiting privilege escalation damage if malicious code executes via the unquoted path in CVE-2020-36930.

NVD Description

SysGauge Server 7.9.18 contains an unquoted service path vulnerability in its binary path configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in 'C:\Program Files\SysGauge Server\bin\sysgaus.exe' to inject malicious executables and escalate privileges.

Deeper analysisAI

CVE-2020-36930 affects SysGauge Server version 7.9.18 and involves an unquoted service path vulnerability in the binary path configuration for 'C:\Program Files\SysGauge Server\bin\sysgaus.exe'. This issue, mapped to CWE-428, enables local attackers to potentially execute arbitrary code by exploiting the unquoted path. The vulnerability carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-01-16.

Local attackers with low privileges can exploit this vulnerability by placing malicious executables in directories searched prior to the legitimate binary path. When the SysGauge service starts or restarts, it may execute the injected code instead, allowing privilege escalation.

Advisories and references include a proof-of-concept exploit at https://www.exploit-db.com/exploits/50009, the vendor site at https://www.sysgauge.com, and a VulnCheck advisory at https://www.vulncheck.com/advisories/sysgauge-sysgauge-server-unquoted-service-path. Security practitioners should review these sources for detailed mitigation guidance.

Details

CWE(s)

Affected Products

flexense
sysgauge
7.9.18

CVEs Like This One

CVE-2021-47809Same vendor: Flexense
CVE-2020-37100Same vendor: Flexense
CVE-2021-47807Same vendor: Flexense
CVE-2021-47806Same vendor: Flexense
CVE-2021-47805Same vendor: Flexense
CVE-2020-36927Same vendor: Flexense
CVE-2025-59893Same vendor: Flexense
CVE-2025-59891Same vendor: Flexense
CVE-2020-36946Same vendor: Flexense
CVE-2025-59894Same vendor: Flexense

References