Home

Description

Flexsense DiskBoss 11.7.28 allows unauthenticated attackers to elevate their privileges using any of its services, enabling remote code execution during startup or reboot with escalated privileges. Attackers can exploit the unquoted service path vulnerability by specifying a malicious service name in the 'sc qc' command, allowing them to execute arbitrary system commands.

PUBLISHED Reserved 2025-12-05 | Published 2025-12-05 | Updated 2025-12-05 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-428 Unquoted Search Path or Element

Product status

Default status
unaffected

11.7.28
affected

Default status
unaffected

11.7.28
affected

Default status
unaffected

11.7.28
affected

Default status
unaffected

11.7.28
affected

Default status
unaffected

11.7.28
affected

Default status
unaffected

11.7.28
affected

Default status
unaffected

11.7.28
affected

Credits

Mohammed Alshehri, m507 finder

References

www.exploit-db.com/exploits/49022 (Exploit Database Entry 49022) exploit

www.diskboss.com/ (DiskBoss Homepage) product

www.diskboss.com/downloads.html (DiskBoss Software Link) product

www.vulncheck.com/...ice-unquoted-service-path-vulnerability third-party-advisory

cve.org (CVE-2020-36879)

nvd.nist.gov (CVE-2020-36879)