CVE-2020-36937 Overview
CVE-2020-36937 is an unquoted service path vulnerability affecting Microvirt MEMU Play 3.7.0, a popular Android emulator for Windows. The vulnerability exists in the MEmusvc Windows service, which contains an unquoted binary path that allows local attackers to potentially execute arbitrary code with elevated LocalSystem privileges.
When a Windows service executable path contains spaces and is not properly quoted, the operating system may misinterpret the path and execute a malicious binary placed in an earlier directory position. This classic privilege escalation technique enables attackers to gain SYSTEM-level access on affected systems.
Critical Impact
Local attackers with low privileges can exploit the unquoted service path in MEmusvc to execute arbitrary code with LocalSystem privileges, potentially leading to complete system compromise.
Affected Products
- Microvirt MEMU Play 3.7.0 for Windows
- MEmusvc Windows Service component
Discovery Timeline
- 2026-01-25 - CVE CVE-2020-36937 published to NVD
- 2026-01-26 - Last updated in NVD database
Technical Details for CVE-2020-36937
Vulnerability Analysis
This vulnerability falls under CWE-428 (Unquoted Search Path or Element), a common Windows privilege escalation vector. The MEmusvc service binary path is registered without proper quotation marks around the executable path. When the service path contains spaces and lacks quotes, Windows parses the path sequentially, attempting to execute binaries at each space-delimited portion of the path.
The attack requires local access to the system and the ability to write files to specific directories within the service path hierarchy. An attacker who can place a malicious executable in the appropriate location will have their code executed with the service's privileges (LocalSystem) the next time the service starts or the system reboots.
Root Cause
The root cause is improper handling of service path registration during the MEMU Play installation process. When the software registers the MEmusvc service with the Windows Service Control Manager (SCM), the ImagePath registry value is set without enclosing the full path in quotation marks. This oversight creates the unquoted service path condition that attackers can exploit.
For example, a path like C:\Program Files\Microvirt\MEmu\MEmusvc.exe without quotes allows Windows to attempt execution of C:\Program.exe, C:\Program Files\Microvirt\MEmu\MEmusvc.exe, or other intermediate paths before reaching the intended executable.
Attack Vector
The exploitation of this vulnerability follows a straightforward local privilege escalation pattern:
- Reconnaissance: The attacker identifies the unquoted service path by querying the Windows registry or using tools like wmic or PowerShell
- Payload Placement: The attacker creates a malicious executable (e.g., Program.exe) and places it in C:\ or another writable directory in the path
- Trigger Execution: The service is restarted, or the attacker waits for a system reboot
- Privilege Escalation: Windows executes the malicious binary with LocalSystem privileges instead of the legitimate service executable
The attack is classified as local, requiring the attacker to already have some level of access to the target system, but only low privileges are needed to potentially achieve complete system compromise.
Detection Methods for CVE-2020-36937
Indicators of Compromise
- Presence of unexpected executables in C:\ root directory (e.g., Program.exe, Program Files.exe)
- Unusual executable files in directories along the MEMU Play installation path
- Service execution anomalies for MEmusvc in Windows Event Logs
- Unexpected child processes spawned by the MEmusvc service
Detection Strategies
- Query all Windows services for unquoted paths using PowerShell: Get-WmiObject win32_service | Where-Object { $_.PathName -notmatch '^"' -and $_.PathName -match '\s' }
- Monitor the HKLM\SYSTEM\CurrentControlSet\Services\MEmusvc\ImagePath registry key for path modifications
- Deploy endpoint detection rules to alert on executables created in C:\ or C:\Program Files\ that don't match known software installations
- Use SentinelOne's behavioral AI to detect anomalous process creation patterns from service contexts
Monitoring Recommendations
- Enable Windows Security Event logging for service creation and modification events (Event IDs 7045, 4697)
- Configure file integrity monitoring on directories commonly targeted by unquoted path exploits
- Implement SentinelOne's Vigilance service for 24/7 monitoring of privilege escalation attempts
- Regularly audit installed services for unquoted path vulnerabilities as part of security hardening
How to Mitigate CVE-2020-36937
Immediate Actions Required
- Audit the MEmusvc service path and manually add quotation marks to the ImagePath registry value
- Check for and remove any suspicious executables in C:\, C:\Program.exe, or similar locations
- Consider temporarily disabling the MEmusvc service if not required for operations
- Update to a patched version of MEMU Play if available from the vendor
Patch Information
Users should check the MemuPlay Homepage for updated versions that address this vulnerability. The VulnCheck Advisory for Memu Play provides additional technical details. Historical exploit information is documented at Exploit-DB #49016.
Workarounds
- Manually quote the service path in the Windows Registry by modifying HKLM\SYSTEM\CurrentControlSet\Services\MEmusvc\ImagePath to include quotes around the full path
- Restrict write permissions on directories in the service path to prevent unauthorized executable placement
- Implement application whitelisting to prevent unauthorized executables from running
- Consider uninstalling MEMU Play if not business-critical until a vendor patch is available
# PowerShell command to fix unquoted service path
# Run as Administrator
$serviceName = "MEmusvc"
$regPath = "HKLM:\SYSTEM\CurrentControlSet\Services\$serviceName"
$currentPath = (Get-ItemProperty -Path $regPath -Name ImagePath).ImagePath
if ($currentPath -notmatch '^"') {
$quotedPath = '"' + $currentPath + '"'
Set-ItemProperty -Path $regPath -Name ImagePath -Value $quotedPath
Write-Host "Service path updated to: $quotedPath"
}
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

