CVE-2021-47823

7.8 HIGH

📋 TL;DR

CVE-2021-47823 is an unquoted service path vulnerability in Acer ePowerSvc that allows local attackers to execute arbitrary code with LocalSystem privileges. This affects Windows systems where the vulnerable Acer software is installed. Attackers need local access to the system to exploit this vulnerability.

💻 Affected Systems

Products:
  • Acer ePowerSvc
Versions: 6.0.3008.0 and potentially earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Windows systems with Acer ePowerSvc installed. The vulnerability exists in the default installation configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with LocalSystem privileges, allowing complete control over the affected system, installation of persistent malware, credential theft, and lateral movement.

🟠

Likely Case

Local privilege escalation leading to administrative control of the affected system, enabling further attacks within the network.

🟢

If Mitigated

Limited impact if proper access controls prevent local users from writing to vulnerable directories and service paths are properly quoted.

🌐 Internet-Facing: LOW - This requires local access to the system and cannot be exploited remotely over the internet.
🏢 Internal Only: HIGH - Internal attackers with local access can exploit this to gain elevated privileges on affected systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit code is publicly available on Exploit-DB (ID 49900). Attackers need local access and ability to write to a directory in the unquoted service path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version from Acer or remove the software

Vendor Advisory: https://www.acer.com

Restart Required: Yes

Instructions:

1. Check for updates through Acer Care Center or Acer website. 2. Install any available updates for ePowerSvc. 3. Restart the system to apply changes. 4. Alternatively, uninstall Acer ePowerSvc if not needed.

🔧 Temporary Workarounds

Quote Service Path

windows

Manually edit the service path to include quotes around the executable path

sc config ePowerSvc binPath= "C:\Program Files\Acer\ePowerSvc\ePowerSvc.exe"

Restrict Directory Permissions

windows

Set restrictive permissions on directories in the unquoted service path

icacls "C:\Program Files\Acer" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Remove write permissions for non-administrative users on directories in the unquoted service path
  • Monitor for suspicious file creation in Acer program directories and service startup events

🔍 How to Verify

Check if Vulnerable:

Check if Acer ePowerSvc service path is unquoted: sc qc ePowerSvc | findstr BINARY_PATH_NAME

Check Version:

Check installed version in Control Panel > Programs and Features or via PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*ePowerSvc*'}

Verify Fix Applied:

Verify service path is quoted: sc qc ePowerSvc should show quotes around the executable path

📡 Detection & Monitoring

Log Indicators:

  • Event ID 7045: Service installed with unquoted path
  • Unexpected file creation in Acer program directories
  • Suspicious service startup events

Network Indicators:

  • No network indicators - local privilege escalation only

SIEM Query:

EventID=7045 AND ServiceName="ePowerSvc" AND NOT ImagePath LIKE "%""%"

🔗 References

📤 Share & Export