Home

Description

NETGATE Registry Cleaner build 16.0.205 contains an unquoted service path vulnerability in the NGRegClnSrv service that allows local attackers to escalate privileges by exploiting the service binary path. Attackers can place a malicious executable in the unquoted path and trigger service restart or system reboot to execute code with LocalSystem privileges.

PUBLISHED Reserved 2026-04-04 | Published 2026-04-04 | Updated 2026-04-06 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Unquoted Search Path or Element

Product status

16.0.205
affected

Credits

Amir.ght finder

References

www.exploit-db.com/exploits/40539 (ExploitDB-40539) exploit

www.netgate.sk/ (Official Product Homepage) product

www.netgate.sk/download/download.php?id=4 (Product Reference) product

www.vulncheck.com/...uoted-service-path-privilege-escalation (VulnCheck Advisory: NETGATE Registry Cleaner build 16.0.205 Unquoted Service Path Privilege Escalation) third-party-advisory

cve.org (CVE-2016-20057)

nvd.nist.gov (CVE-2016-20057)

Download JSON