# Service Trusted Path Escalated Privilege Vulnerability This document will explain you about the Service Trusted Path Escalated Privilege Vulnerability. Attackers could gain elevated privileges by inserting an executable file in the path of affected service. **Update Released Build :** 92091 **Update Release Date :** August -02- 2016 ## What was the Problem? If the installed service uses an unquoted service path which contains at least one blank space, then a local attacker could gain elevated privileges by inserting an executable file in the path of affected service. ## How do I fix it? This has been identified and fixed, in the Endpoint Central build **92091**. [Upgrade](https://www.manageengine.com/products/desktop-central/service-packs.html) to the latest build for this issue to be fixed. **Keywords:** Security Updates, Vulnerabilities and Fixes, Service Trusted Path Privilege Escalation [Knowledge Base](https://www.manageengine.com/products/desktop-central/knowledge-base.html)