Home

Description

NCP Secure Entry Client 9.2 contains an unquoted service path vulnerability in multiple Windows services that allows local users to potentially execute arbitrary code. Attackers can exploit the unquoted paths in services like ncprwsnt, rwsrsu, ncpclcfg, and NcpSec to inject malicious code that would execute with LocalSystem privileges during service startup.

PUBLISHED Reserved 2026-01-06 | Published 2026-02-04 | Updated 2026-02-05 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Unquoted Search Path or Element

Product status

9.2x
affected

Credits

Akif Mohamed Ik finder

References

www.exploit-db.com/exploits/47668 (ExploitDB-47668) exploit

software.ncp-e.com/ (NCP Software Vendor Homepage) product

www.vulncheck.com/...ecureentryclient-unquoted-service-paths (VulnCheck Advisory: NCP_Secure_Entry_Client 9.2 - Unquoted Service Paths) third-party-advisory

cve.org (CVE-2019-25281)

nvd.nist.gov (CVE-2019-25281)

Download JSON