CVE-2021-47828

7.8 HIGH

📋 TL;DR

CVE-2021-47828 is an unquoted service path vulnerability in BOOTP Turbo 2.0.0.1253 that allows attackers to execute arbitrary code with LocalSystem privileges during system startup or reboot. This affects Windows systems running the vulnerable version of BOOTP Turbo service. Attackers need local access to place malicious executables in specific directories.

💻 Affected Systems

Products:
  • BOOTP Turbo
Versions: 2.0.0.1253
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where BOOTP Turbo service is installed and running. The vulnerability exists in the service configuration, not the application code.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with LocalSystem privileges leading to complete control over the Windows system, persistence mechanisms, and potential lateral movement across the network.

🟠

Likely Case

Local privilege escalation allowing attackers to gain SYSTEM privileges and install backdoors, steal credentials, or disable security controls.

🟢

If Mitigated

Limited impact if proper file permissions restrict write access to system directories and endpoint protection blocks suspicious executables.

🌐 Internet-Facing: LOW - Requires local access to the system; not directly exploitable over the network.
🏢 Internal Only: HIGH - Any compromised user account with local access can exploit this to gain SYSTEM privileges and potentially move laterally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to create malicious executables in specific directories. Public exploit code is available on Exploit-DB.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://www.weird-solutions.com

Restart Required: Yes

Instructions:

1. Download updated version from vendor website if available
2. Uninstall vulnerable version
3. Install patched version
4. Restart system to ensure service path changes take effect

🔧 Temporary Workarounds

Quote Service Path

windows

Modify the service configuration to use quoted paths in the service executable path

sc config "BOOTP Turbo" binPath= "\"C:\Program Files\BOOTP Turbo\bootpt.exe\""

Restrict Directory Permissions

windows

Set strict ACLs on directories in the service path to prevent unauthorized file creation

icacls "C:\Program Files" /deny Everyone:(OI)(CI)W

🧯 If You Can't Patch

  • Remove or disable the BOOTP Turbo service if not required
  • Implement strict file integrity monitoring on directories in the service path

🔍 How to Verify

Check if Vulnerable:

Check service configuration: sc qc "BOOTP Turbo" and look for unquoted paths containing spaces

Check Version:

Check installed version in Programs and Features or run: wmic product where name="BOOTP Turbo" get version

Verify Fix Applied:

Verify service path is quoted: sc qc "BOOTP Turbo" should show quoted executable path

📡 Detection & Monitoring

Log Indicators:

  • Event ID 7045: Service installation with unquoted paths
  • Unexpected executable creation in system directories
  • Service control manager logs showing path modifications

Network Indicators:

  • Unusual outbound connections from SYSTEM account
  • Lateral movement attempts from previously non-privileged accounts

SIEM Query:

source="Windows Security" EventID=4688 AND NewProcessName="*Program Files*" AND SubjectUserName="SYSTEM" AND ParentProcessName="services.exe"

🔗 References

📤 Share & Export