CVE-2020-36936
Unknown Unknown - Not Provided
Unquoted Service Path Vulnerability in Magic Mouse 2 Utilities

Publication date: 2026-01-25

Last updated on: 2026-01-25

Assigner: VulnCheck

Description
Magic Mouse 2 Utilities 2.20 contains an unquoted service path vulnerability in its Windows service configuration. Attackers can exploit the unquoted path to inject malicious executables and gain elevated system privileges by placing a malicious file in the service path.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-25
Last Modified
2026-01-25
Generated
2026-05-07
AI Q&A
2026-01-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
magic_utilities magic_mouse_2_utilities 2.20
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-428 The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an unquoted service path issue in Magic Mouse 2 Utilities version 2.20 on Windows. The service path for the Windows service 'magicmouse2service' is not enclosed in quotes, which allows attackers with local access to place a malicious executable in a location that Windows may execute with elevated system privileges. This can lead to privilege escalation by exploiting how Windows interprets unquoted paths containing spaces. [2, 3]


How can this vulnerability impact me? :

An attacker who has local access to the affected system can exploit this vulnerability to execute arbitrary malicious code with elevated system privileges. This means the attacker can gain higher-level control over the system, potentially compromising confidentiality, integrity, and availability of the system and its data. [2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking the service path of the 'magicmouse2service' Windows service for unquoted paths containing spaces. On a Windows system, you can use the following command in an elevated Command Prompt or PowerShell to check the service path: sc qc magicmouse2service. If the path to the executable is not enclosed in quotes and contains spaces, the system is vulnerable. For example, if the output shows a path like C:\Program Files (x86)\Magic Mouse 2 - Utilities\MagicMouse2Service.exe without quotes, it indicates the presence of the unquoted service path vulnerability. [2, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include correcting the service path by enclosing it in quotes to prevent Windows from misinterpreting the path and executing malicious executables. This can be done by editing the service configuration to ensure the binary path is quoted, for example: "C:\Program Files (x86)\Magic Mouse 2 - Utilities\MagicMouse2Service.exe". Additionally, restrict local user permissions to prevent unauthorized users from placing executables in the service path directories. Applying updates or patches from the vendor Magic Utilities Pty Ltd, if available, is also recommended. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart