CVE-2020-36936
Unquoted Service Path Vulnerability in Magic Mouse 2 Utilities
Publication date: 2026-01-25
Last updated on: 2026-01-25
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| magic_utilities | magic_mouse_2_utilities | 2.20 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-428 | The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an unquoted service path issue in Magic Mouse 2 Utilities version 2.20 on Windows. The service path for the Windows service 'magicmouse2service' is not enclosed in quotes, which allows attackers with local access to place a malicious executable in a location that Windows may execute with elevated system privileges. This can lead to privilege escalation by exploiting how Windows interprets unquoted paths containing spaces. [2, 3]
How can this vulnerability impact me? :
An attacker who has local access to the affected system can exploit this vulnerability to execute arbitrary malicious code with elevated system privileges. This means the attacker can gain higher-level control over the system, potentially compromising confidentiality, integrity, and availability of the system and its data. [2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the service path of the 'magicmouse2service' Windows service for unquoted paths containing spaces. On a Windows system, you can use the following command in an elevated Command Prompt or PowerShell to check the service path: sc qc magicmouse2service. If the path to the executable is not enclosed in quotes and contains spaces, the system is vulnerable. For example, if the output shows a path like C:\Program Files (x86)\Magic Mouse 2 - Utilities\MagicMouse2Service.exe without quotes, it indicates the presence of the unquoted service path vulnerability. [2, 3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include correcting the service path by enclosing it in quotes to prevent Windows from misinterpreting the path and executing malicious executables. This can be done by editing the service configuration to ensure the binary path is quoted, for example: "C:\Program Files (x86)\Magic Mouse 2 - Utilities\MagicMouse2Service.exe". Additionally, restrict local user permissions to prevent unauthorized users from placing executables in the service path directories. Applying updates or patches from the vendor Magic Utilities Pty Ltd, if available, is also recommended. [2, 3]