CVE-2021-20713

7.8 HIGH

📋 TL;DR

This is a privilege escalation vulnerability in QND Advance/Premium/Standard software versions 11.0.4i and earlier. It allows authenticated attackers on Windows systems where the client is installed to gain administrative privileges, potentially leading to data theft, system manipulation, or unauthorized operations. Organizations using affected QND versions on Windows are at risk.

💻 Affected Systems

Products:
  • QND Advance
  • QND Premium
  • QND Standard
Versions: 11.0.4i and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the Windows system where QND client is installed. The vulnerability affects the Windows client component specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an attacker gains full administrative control, exfiltrates sensitive data, installs persistent malware, or disrupts critical operations.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, access restricted data, or modify system configurations within the compromised environment.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege principles, and monitoring are in place, though local compromise risk remains.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the Windows system. The vectors are unspecified in public disclosures, suggesting limited technical details are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 11.0.4i

Vendor Advisory: https://www.qualitysoft.com/product/qnd_vulnerabilities_2021/

Restart Required: Yes

Instructions:

1. Download the latest version from QualitySoft's official website. 2. Uninstall the current vulnerable version. 3. Install the updated version. 4. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Restrict Local Access

windows

Limit physical and remote access to systems running QND to trusted users only.

Implement Least Privilege

windows

Run QND client with minimal necessary privileges and separate administrative accounts from standard user accounts.

🧯 If You Can't Patch

  • Isolate affected systems on segmented networks to limit lateral movement.
  • Implement strict access controls and monitoring for any local login attempts on QND systems.

🔍 How to Verify

Check if Vulnerable:

Check the QND software version in the application's about or help menu. If version is 11.0.4i or earlier, the system is vulnerable.

Check Version:

Check via QND application interface or Windows Programs and Features for installed version.

Verify Fix Applied:

After updating, verify the version is higher than 11.0.4i and test that standard users cannot gain administrative privileges through the QND client.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events in Windows Security logs
  • Unexpected administrative actions from non-admin accounts

Network Indicators:

  • Unusual outbound connections from QND client systems

SIEM Query:

Windows Event ID 4672 (Special privileges assigned) from non-administrative accounts on systems with QND installed.

🔗 References

📤 Share & Export