CVE-2021-47868

7.8 HIGH

📋 TL;DR

CVE-2021-47868 is an unquoted service path vulnerability in WIN-PACK PRO 4.8's WPCommandFileService that allows local attackers to execute arbitrary code with LocalSystem privileges. This affects systems running WIN-PACK PRO 4.8 where an attacker has local access to the machine. The vulnerability enables privilege escalation from a lower-privileged user account to SYSTEM-level access.

💻 Affected Systems

Products:
  • WIN-PACK PRO
Versions: Version 4.8
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation path and service configuration. Requires local access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with LocalSystem privileges, allowing attackers to install persistent malware, steal credentials, disable security controls, and pivot to other systems.

🟠

Likely Case

Local privilege escalation leading to persistence establishment, credential harvesting, and lateral movement within the network.

🟢

If Mitigated

Limited impact if proper access controls, least privilege principles, and endpoint protection are in place to detect and block unauthorized service modifications.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Any compromised user account with local access to affected systems can exploit this to gain SYSTEM privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system. The unquoted service path allows attackers to place malicious executables in directories that will be executed with elevated privileges when the service starts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://www.security.honeywell.com/product-repository/winpak

Restart Required: Yes

Instructions:

1. Check Honeywell security advisory for latest patched version. 2. Download and install the update from official vendor sources. 3. Restart the system to ensure the updated service is running.

🔧 Temporary Workarounds

Quote Service Path

windows

Modify the service path to include quotes around the executable path to prevent path interpretation issues.

sc config "WPCommandFileService" binPath= "\"C:\Program Files (x86)\WINPAKPRO\WPCommandFileService Service.exe\""

Restrict Write Permissions

windows

Remove write permissions from directories in the service path to prevent malicious file placement.

icacls "C:\Program Files (x86)" /deny Users:(OI)(CI)W
icacls "C:\Program Files (x86)\WINPAKPRO" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to affected systems.
  • Deploy endpoint detection and response (EDR) solutions to monitor for service path manipulation and unauthorized privilege escalation attempts.

🔍 How to Verify

Check if Vulnerable:

Check if the WPCommandFileService service path is unquoted: sc qc "WPCommandFileService" | findstr BINARY_PATH_NAME

Check Version:

Check WIN-PACK PRO version through the application interface or registry: reg query "HKLM\SOFTWARE\WINPAKPRO" /v Version

Verify Fix Applied:

Verify the service path is properly quoted and check that no unauthorized executables exist in the service path directories.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing service path modifications (Event ID 7040)
  • Unexpected service restarts or failures
  • Creation of executables in C:\Program Files (x86) or WINPAKPRO directories by non-admin users

Network Indicators:

  • Unusual outbound connections from the WINPAKPRO service
  • Lateral movement attempts from the affected system

SIEM Query:

EventID=7040 AND ServiceName="WPCommandFileService" OR ProcessCreation WHERE ImagePath contains "C:\\Program Files (x86)\\WINPAKPRO" AND User NOT IN ("SYSTEM", "Administrators")

🔗 References

📤 Share & Export