CVE-2021-47829

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to execute arbitrary code with SYSTEM privileges by exploiting an unquoted service path in DHCP Broadband. Attackers can place malicious executables in locations that get executed when the service starts. Only systems running DHCP Broadband 4.1.0.1503 on Windows are affected.

💻 Affected Systems

Products:
  • DHCP Broadband
Versions: 4.1.0.1503
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows systems where the service path contains spaces and is unquoted in the service configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing attackers to install persistent malware, steal credentials, or pivot to other systems.

🟠

Likely Case

Local privilege escalation leading to persistence, credential theft, and lateral movement within the network.

🟢

If Mitigated

Limited impact if proper endpoint protection and least privilege principles are enforced.

🌐 Internet-Facing: LOW - Requires local access to the system.
🏢 Internal Only: HIGH - Any compromised user account on affected systems can escalate to SYSTEM privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to write to directories in the service path. Public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check vendor website for updated version. 2. If available, download and install updated version. 3. Restart the service. 4. Verify the service path is properly quoted in registry.

🔧 Temporary Workarounds

Quote Service Path

windows

Manually quote the service path in Windows registry to prevent path interpretation issues.

sc config "DHCP Broadband" binPath= "\"C:\Program Files\DHCP Broadband 4\dhcpt.exe\""

Restrict Directory Permissions

windows

Remove write permissions for non-administrative users on directories in the service path.

icacls "C:\Program Files\DHCP Broadband 4" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Remove DHCP Broadband service if not required.
  • Implement strict endpoint detection and response (EDR) to monitor for privilege escalation attempts.

🔍 How to Verify

Check if Vulnerable:

Check if service path is unquoted: sc qc "DHCP Broadband" | findstr /i "BINARY_PATH_NAME"

Check Version:

Check program version in Control Panel > Programs and Features or run: wmic product where name="DHCP Broadband" get version

Verify Fix Applied:

Verify service path is quoted: sc qc "DHCP Broadband" | findstr /i "BINARY_PATH_NAME" and check for quotes around the path.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4688 (process creation) showing unexpected executables running from DHCP Broadband directories
  • Windows Event ID 7045 (service installation) for new services

Network Indicators:

  • Unusual outbound connections from systems running DHCP Broadband service

SIEM Query:

source="windows" AND (event_id=4688 OR event_id=7045) AND (process_path="*DHCP Broadband*" OR service_name="DHCP Broadband")

🔗 References

📤 Share & Export