CVE-2021-47887

7.8 HIGH

📋 TL;DR

CVE-2021-47887 is an unquoted service path vulnerability in OKI Print Job Accounting 4.4.10 that allows local attackers to execute arbitrary code with elevated privileges. Attackers can place malicious executables in the service path to hijack the OkiJaSvc service. This affects organizations using OKI Print Job Accounting software on Windows systems.

💻 Affected Systems

Products:
  • OKI Print Job Accounting
Versions: 4.4.10
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation path 'C:\Program Files\Okidata\Print Job Accounting\' where spaces in the path are not properly quoted in the service configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via privilege escalation to SYSTEM-level access, enabling complete control over the affected system and potential lateral movement within the network.

🟠

Likely Case

Local privilege escalation allowing attackers to gain administrative privileges on the compromised system, install malware, or access sensitive data.

🟢

If Mitigated

Limited impact with proper access controls preventing local users from writing to the vulnerable directory path.

🌐 Internet-Facing: LOW - This vulnerability requires local access to the system and cannot be exploited remotely over the internet.
🏢 Internal Only: HIGH - Malicious insiders or compromised accounts with local access can exploit this vulnerability to escalate privileges within the internal network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to create malicious executables in the vulnerable directory path. Proof of concept code is publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified by vendor

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

1. Check OKI website for updated version
2. If available, download and install the patched version
3. Verify the service path is properly quoted after installation

🔧 Temporary Workarounds

Add quotes to service path

windows

Manually edit the service configuration to add quotes around the service executable path

sc config OkiJaSvc binPath= "\"C:\Program Files\Okidata\Print Job Accounting\OkiJaSvc.exe\""

Restrict directory permissions

windows

Remove write permissions for non-administrative users on the vulnerable directory path

icacls "C:\Program Files\Okidata\Print Job Accounting" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local users from writing to the vulnerable directory path
  • Monitor for suspicious file creation in 'C:\Program Files\Okidata\Print Job Accounting\' directory

🔍 How to Verify

Check if Vulnerable:

Check if OkiJaSvc service path contains spaces without quotes: sc qc OkiJaSvc | findstr BINARY_PATH_NAME

Check Version:

Check installed version through Control Panel > Programs and Features or the application interface

Verify Fix Applied:

Verify service path is properly quoted: sc qc OkiJaSvc should show quotes around the full path

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing unauthorized file creation in the vulnerable directory
  • Service control manager logs showing OkiJaSvc service modifications

Network Indicators:

  • Unusual outbound connections from systems running OKI Print Job Accounting

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%OkiJaSvc%' OR CommandLine LIKE '%OkiJaSvc%')

🔗 References

📤 Share & Export