IP Watcher 3.0.0.30 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched with elevated LocalSystem privileges during service startup.
Metrics
Affected Vendors & Products
References
History
Wed, 28 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 Jan 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IP Watcher 3.0.0.30 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched with elevated LocalSystem privileges during service startup. | |
| Title | IP Watcher v3.0.0.30 - 'PACService.exe' Unquoted Service Path | |
| Weaknesses | CWE-428 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-28T14:55:34.608Z
Reserved: 2026-01-27T15:47:07.999Z
Link: CVE-2020-36985
Updated: 2026-01-28T14:55:31.178Z
Status : Received
Published: 2026-01-28T13:15:51.240
Modified: 2026-01-28T13:15:51.240
Link: CVE-2020-36985
No data.
OpenCVE Enrichment
No data.