Home

Description

OKI sPSV Port Manager 1.0.41 contains an unquoted service path vulnerability in the sPSVOpLclSrv service that allows local attackers to escalate privileges by inserting executable files into the unquoted path. Attackers can place a malicious executable in a directory within the service path that will execute with LocalSystem privileges when the service restarts or the system reboots.

PUBLISHED Reserved 2026-05-15 | Published 2026-05-16 | Updated 2026-05-18 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Unquoted Search Path or Element

Product status

1.0.41
affected

Credits

Julio Aviña finder

References

www.exploit-db.com/exploits/49005 (ExploitDB-49005) exploit

www.oki.com/ (Official Product Homepage) product

www.oki.com/mx/printing/download/sPSV_010041_2_270910.exe (Product Reference) product

www.vulncheck.com/...uoted-service-path-privilege-escalation (VulnCheck Advisory: OKI sPSV Port Manager 1.0.41 Unquoted Service Path Privilege Escalation) third-party-advisory

cve.org (CVE-2020-37229)

nvd.nist.gov (CVE-2020-37229)

Download JSON