CVE-2021-47822

7.8 HIGH

📋 TL;DR

DiskBoss Service 12.2.18 has an unquoted service path vulnerability that allows local attackers to execute arbitrary code with SYSTEM privileges. Attackers can place malicious executables in path locations to gain complete system control during service startup. This affects all systems running the vulnerable DiskBoss Service version.

💻 Affected Systems

Products:
  • DiskBoss Service
Versions: 12.2.18 and likely earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation configuration of the DiskBoss Service executable path.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation to SYSTEM, enabling attackers to install backdoors, disable security controls, and access sensitive system resources.

🟢

If Mitigated

Limited impact if proper access controls prevent local users from writing to system directories and service paths are properly monitored.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system and ability to write to directories in the service path. Public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.diskboss.com

Restart Required: Yes

Instructions:

1. Check vendor website for updated version. 2. If available, download and install updated version. 3. Restart the DiskBoss Service. 4. Verify the service path is properly quoted in Windows Services.

🔧 Temporary Workarounds

Manually Quote Service Path

windows

Manually edit the service path in Windows Services to include quotes around the executable path

sc config "DiskBoss Service" binPath= "\"C:\Program Files\DiskBoss\diskbsa.exe\""
sc stop "DiskBoss Service"
sc start "DiskBoss Service"

Restrict Directory Permissions

windows

Remove write permissions for non-administrative users on directories in the service path

icacls "C:\Program Files\DiskBoss" /deny Users:(OI)(CI)W
icacls "C:\Program Files" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Disable or uninstall DiskBoss Service if not required
  • Implement strict access controls to prevent local users from writing to system directories

🔍 How to Verify

Check if Vulnerable:

Open Windows Services (services.msc), find DiskBoss Service, check Properties, and examine the Path to executable. If the path contains spaces and is not enclosed in quotes, the system is vulnerable.

Check Version:

Check the DiskBoss Service executable properties or registry at HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall

Verify Fix Applied:

Verify the service path in Windows Services is properly quoted and check that non-admin users cannot write to directories in the service path.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected service restarts of DiskBoss Service
  • Creation of executable files in DiskBoss installation directory by non-admin users
  • Windows Event ID 7045 (Service installed) with suspicious paths

Network Indicators:

  • Unusual outbound connections from DiskBoss Service process

SIEM Query:

source="Windows Security" EventID=4688 AND NewProcessName="*diskbsa.exe" AND SubjectUserName!="SYSTEM"

🔗 References

📤 Share & Export