Description
Privacy Drive 3.17.0 contains an unquoted service path vulnerability in the pdsvc.exe service binary that allows local attackers to escalate privileges by exploiting the service startup process. Attackers can place malicious executables in the unquoted path directories to execute arbitrary code with LocalSystem privileges during service startup or system reboot.
Published: 2026-05-16
Score: 8.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Privacy Drive 3.17.0 contains an unquoted service path vulnerability that lets a local attacker execute arbitrary code with LocalSystem privileges. By placing a malicious executable in the directory referenced by the service startup process, an attacker can cause the executable to run during service startup or a system reboot. This elevates an attacker’s privileges, allowing full control over the affected machine and potentially compromising confidentiality, integrity, and availability of data on that system.

Affected Systems

The vulnerability affects the Cybertronsoft Privacy Drive product, specifically version 3.17.0, where the pdsvc.exe service binary is configured with an unquoted path. No other products or versions are listed as affected.

Risk and Exploitability

The CVSS score of 8.5 indicates a high severity risk. The EPSS score is not available, but the flaw has been demonstrated in the wild through exploit‑db and other advisory sites. It is not listed in the CISA KEV catalog. The likely attack vector is a local attacker who can write to the service path directories or otherwise gain local access to the system, then place a malicious binary there. Once the system starts the pdsvc service or reboots, the malicious code runs with LocalSystem privileges, giving the attacker full control of the system.

Generated by OpenCVE AI on May 16, 2026 at 16:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑provided update that removes the unquoted service path or corrects the service configuration.
  • Stop the pdsvc.exe service before applying the update, and remove any suspicious executables from the service path directories.
  • If an update is not immediately available, temporarily disable the pdsvc.exe service or modify its startup command to use a quoted path.

Generated by OpenCVE AI on May 16, 2026 at 16:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 16 May 2026 15:45:00 +0000

Type Values Removed Values Added
Description Privacy Drive 3.17.0 contains an unquoted service path vulnerability in the pdsvc.exe service binary that allows local attackers to escalate privileges by exploiting the service startup process. Attackers can place malicious executables in the unquoted path directories to execute arbitrary code with LocalSystem privileges during service startup or system reboot.
Title Privacy Drive 3.17.0 Unquoted Service Path Privilege Escalation
Weaknesses CWE-428
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-16T15:25:48.969Z

Reserved: 2026-05-15T13:34:56.885Z

Link: CVE-2020-37231

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-16T16:16:19.050

Modified: 2026-05-16T16:16:19.050

Link: CVE-2020-37231

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-16T16:45:27Z

Weaknesses