CVE-2020-37099 Overview
Disk Savvy Enterprise 12.3.18 contains an unquoted service path vulnerability in its service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in C:\Program Files\Disk Savvy Enterprise\bin\disksvs.exe to inject malicious executables and escalate privileges. This vulnerability is classified under CWE-428 (Unquoted Search Path or Element).
Critical Impact
Local attackers with standard user privileges can exploit this unquoted service path to achieve privilege escalation and execute arbitrary code with SYSTEM-level permissions.
Affected Products
- Disk Savvy Enterprise version 12.3.18
- Windows systems running the vulnerable Disk Savvy Enterprise service
Discovery Timeline
- 2026-02-03 - CVE CVE-2020-37099 published to NVD
- 2026-02-03 - Last updated in NVD database
Technical Details for CVE-2020-37099
Vulnerability Analysis
The unquoted service path vulnerability in Disk Savvy Enterprise stems from improper handling of executable paths in Windows service configurations. When a service executable path contains spaces and is not enclosed in quotation marks, Windows interprets the path differently during service startup. The vulnerable path C:\Program Files\Disk Savvy Enterprise\bin\disksvs.exe contains multiple spaces, creating an exploitable condition.
During service initialization, Windows attempts to locate the executable by parsing the unquoted path from left to right, stopping at each space to check if a valid executable exists. This behavior allows attackers to place a malicious executable at strategic locations that Windows will evaluate before reaching the legitimate service binary.
Root Cause
The root cause is the failure to properly quote the service binary path during installation or configuration. When the ImagePath registry value for the Disk Savvy Enterprise service is set without surrounding quotation marks, Windows Service Control Manager (SCM) applies its path resolution algorithm, which creates an unintended search order vulnerability. This is a common installation oversight that has persisted across many Windows applications.
Attack Vector
The attack requires local access to the target system and write permissions to one of the directories in the service path. An attacker would:
- Identify the unquoted service path in the Windows registry
- Place a malicious executable named Program.exe in C:\ or Disk.exe in C:\Program Files\
- Wait for or trigger a service restart
- The malicious executable runs with SYSTEM privileges before the legitimate service binary
When the Disk Savvy Enterprise service starts, Windows evaluates the unquoted path sequentially. For the path C:\Program Files\Disk Savvy Enterprise\bin\disksvs.exe, Windows first checks for C:\Program.exe, then C:\Program Files\Disk.exe, and continues until it finds an executable or reaches the full path. If an attacker places a malicious binary at any of these intermediate locations with appropriate permissions, it will execute with the service's elevated privileges.
Detection Methods for CVE-2020-37099
Indicators of Compromise
- Presence of suspicious executables named Program.exe in C:\ or Disk.exe in C:\Program Files\
- Unexpected child processes spawning from the Disk Savvy Enterprise service
- Anomalous registry modifications to the ImagePath value of the Disk Savvy service
- Unusual file creation events in root directories or Program Files folders
Detection Strategies
- Monitor service registry keys for unquoted paths using PowerShell commands such as Get-WmiObject win32_service | Where-Object { $_.PathName -notlike '"*' -and $_.PathName -like '* *' }
- Implement file integrity monitoring on directories that could be exploited (e.g., C:\, C:\Program Files\)
- Use endpoint detection tools to alert on new executable files in high-risk locations
- Review Windows Event Logs for service start failures or unexpected service behavior (Event IDs 7034, 7035, 7036)
Monitoring Recommendations
- Configure SentinelOne policies to detect and block unauthorized executables in system directories
- Enable auditing for file creation events in the C:\ root and C:\Program Files\ directories
- Set up alerts for modifications to Windows service configurations in the registry
- Implement application allowlisting to prevent unauthorized binaries from executing
How to Mitigate CVE-2020-37099
Immediate Actions Required
- Audit all installed services for unquoted paths and remediate as needed
- Restrict write permissions on C:\ and C:\Program Files\ directories to administrators only
- Update Disk Savvy Enterprise to a patched version if available from the vendor
- Implement SentinelOne's behavioral detection capabilities to identify privilege escalation attempts
Patch Information
Review the Disk Savvy Product Information page for updated versions that address this vulnerability. Additional technical details are available in the Exploit-DB #48049 advisory and the VulnCheck Advisory for Disk Savvy.
Workarounds
- Manually fix the service path by adding quotation marks to the registry ImagePath value
- Remove write permissions for non-administrative users from directories in the service path
- Implement application control policies to block execution of unauthorized binaries
- Consider uninstalling Disk Savvy Enterprise until a patched version is available
# Fix unquoted service path via registry
reg add "HKLM\SYSTEM\CurrentControlSet\Services\DiskSavvyService" /v ImagePath /t REG_EXPAND_SZ /d "\"C:\Program Files\Disk Savvy Enterprise\bin\disksvs.exe\"" /f
# Verify the fix was applied
reg query "HKLM\SYSTEM\CurrentControlSet\Services\DiskSavvyService" /v ImagePath
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


