Unquoted Service Path
When a service is created within the Windows operating system whose executable path contains spaces and is not enclosed within quotation marks, the service will be susceptible to an Unquoted Service Path vulnerability.
To exploit this vulnerability, an executable file must be created in a particular location in the service's executable path, and instead of starting up the antivirus service, the service we created previously will load first and cause the antivirus to not load during operating system startup.
When this type of vulnerability is located on an endpoint, regardless of which antivirus software is in place, it can be exploited to achieve higher privileges with the added value of persistence on the system.
For antivirus bypass research, this vulnerability can be used for a different purpose, to force the antivirus software to not load itself or one of its components so it will potentially miss threats and in that way, the vulnerability can...