Atomic Alarm Clock 6.3 contains a local privilege escalation vulnerability in its service configuration that allows attackers to execute arbitrary code with SYSTEM privileges. Attackers can exploit the unquoted service path by placing a malicious executable named 'Program.exe' to gain persistent system-level access.
Metrics
Affected Vendors & Products
References
History
Tue, 03 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Drive-software
Drive-software atomic Alarm Clock X86 |
|
| Vendors & Products |
Drive-software
Drive-software atomic Alarm Clock X86 |
Fri, 30 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Atomic Alarm Clock 6.3 contains a local privilege escalation vulnerability in its service configuration that allows attackers to execute arbitrary code with SYSTEM privileges. Attackers can exploit the unquoted service path by placing a malicious executable named 'Program.exe' to gain persistent system-level access. | |
| Title | Atomic Alarm Clock x86 6.3 - 'AtomicAlarmClock' Unquoted Service Path | |
| Weaknesses | CWE-428 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-01-30T16:16:41.496Z
Updated: 2026-01-30T16:34:14.509Z
Reserved: 2026-01-28T18:18:30.526Z
Link: CVE-2020-37060
Updated: 2026-01-30T16:34:11.768Z
Status : Received
Published: 2026-01-30T17:16:12.217
Modified: 2026-01-30T17:16:12.217
Link: CVE-2020-37060
No data.