CVE-2021-47847

7.8 HIGH

📋 TL;DR

Disk Sorter Server 13.6.12 has an unquoted service path vulnerability that allows local attackers to execute arbitrary code with elevated privileges. Attackers can place malicious executables in the service path to hijack execution when the service starts. This affects systems running Disk Sorter Server 13.6.12 on Windows.

💻 Affected Systems

Products:
  • Disk Sorter Server
Versions: 13.6.12
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations due to Windows service path handling. Requires local access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via privilege escalation to SYSTEM-level access, enabling complete control over the affected system.

🟠

Likely Case

Local privilege escalation allowing attackers to gain administrative privileges and install persistent malware.

🟢

If Mitigated

Limited impact if proper access controls prevent local users from writing to program directories.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to exploit.
🏢 Internal Only: HIGH - Malicious insiders or compromised accounts with local access can exploit this to gain SYSTEM privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access to create malicious executables in the unquoted path. Proof-of-concept code is publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.disksorter.com

Restart Required: Yes

Instructions:

1. Check vendor website for updated version. 2. If available, download and install updated version. 3. Restart the Disk Sorter Server service.

🔧 Temporary Workarounds

Quote Service Path

windows

Modify the service configuration to use quotes around the binary path

sc config "Disk Sorter Server" binPath= "\"C:\Program Files\Disk Sorter Server\bin\disksrs.exe\""

Restrict Directory Permissions

windows

Set strict ACLs on the Disk Sorter Server directories to prevent unauthorized writes

icacls "C:\Program Files\Disk Sorter Server" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)(W)"

🧯 If You Can't Patch

  • Implement strict access controls to prevent local users from writing to program directories
  • Monitor for unauthorized file creation in Disk Sorter Server directories

🔍 How to Verify

Check if Vulnerable:

Check if Disk Sorter Server service path is unquoted: sc qc "Disk Sorter Server" | findstr BINARY_PATH_NAME

Check Version:

Check installed version in Control Panel > Programs and Features or via vendor documentation

Verify Fix Applied:

Verify service path now has quotes: sc qc "Disk Sorter Server" | findstr BINARY_PATH_NAME

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing service start failures
  • Unexpected processes running from Disk Sorter Server directories

Network Indicators:

  • Unusual outbound connections from Disk Sorter Server process

SIEM Query:

Process Creation where ImagePath contains 'Disk Sorter Server' and not (ImagePath contains '\"')

🔗 References

📤 Share & Export