CVE-2021-47867

7.8 HIGH

📋 TL;DR

CVE-2021-47867 is an unquoted service path vulnerability in WIN-PACK PRO 4.8's ScheduleService that allows local attackers to execute arbitrary code with SYSTEM privileges. This affects systems running WIN-PACK PRO 4.8 on Windows where attackers have local access. The vulnerability enables privilege escalation from a lower-privileged user account to full system control.

💻 Affected Systems

Products:
  • WIN-PACK PRO
Versions: 4.8
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where WIN-PACK PRO 4.8 is installed with the vulnerable ScheduleService component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with persistent SYSTEM-level backdoor installation, data theft, and complete control over the affected system.

🟠

Likely Case

Local privilege escalation allowing attackers to install malware, steal credentials, and pivot to other systems on the network.

🟢

If Mitigated

Limited impact with proper access controls, monitoring, and service hardening in place.

🌐 Internet-Facing: LOW - This requires local access to the system, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Any compromised user account on affected systems can escalate to SYSTEM privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to write to a directory in the system path. Public exploit code exists in Exploit-DB.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Honeywell security advisory for updated version

Vendor Advisory: https://www.security.honeywell.com/product-repository/winpak

Restart Required: Yes

Instructions:

1. Check Honeywell advisory for patch availability. 2. Apply vendor-provided patch. 3. Restart affected services. 4. Verify service path is properly quoted.

🔧 Temporary Workarounds

Quote Service Path

windows

Manually modify the service path to include quotes around the executable path

sc config ScheduleService binPath= "\"C:\Program Files (x86)\WINPAKPRO\ScheduleService Service.exe\""

Restrict Directory Permissions

windows

Remove write permissions from directories in the vulnerable path for non-administrative users

icacls "C:\Program Files (x86)" /deny Users:(OI)(CI)W
icacls "C:\Program Files" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to affected systems
  • Monitor for suspicious service creation or modification events and unauthorized executable files in system directories

🔍 How to Verify

Check if Vulnerable:

Run: sc qc ScheduleService and check if the binPath value has quotes around the full executable path

Check Version:

Check WIN-PACK PRO version in Control Panel > Programs and Features or via vendor documentation

Verify Fix Applied:

Verify service path is quoted: sc qc ScheduleService | findstr /i binPath

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 7045: Service installed
  • Unexpected service creation/modification
  • Executable creation in system directories

Network Indicators:

  • Unusual outbound connections from ScheduleService process

SIEM Query:

EventID=7045 AND ServiceName="ScheduleService" OR ProcessCreation WHERE ImagePath contains "ScheduleService" AND NOT ImagePath contains '"'

🔗 References

📤 Share & Export