Cyber Posture

CVE-2021-47806

HighPublic PoC

Published: 16 January 2026

Published
16 January 2026
Modified
30 January 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2021-47806 is a high-severity Unquoted Search Path or Element (CWE-428) vulnerability in Flexense Dup Scout. Its CVSS base score is 7.8 (High).

Operationally, ranked at the 0.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and RA-5 (Vulnerability Monitoring and Scanning).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Establishes and enforces secure configuration settings for services, including proper quoting of executable paths to directly prevent unquoted service path exploitation.

prevent

Requires timely remediation of identified flaws, such as patching or fixing the unquoted service path in Dup Scout to eliminate the vulnerability.

detect

Vulnerability scanning specifically identifies unquoted service path issues like CVE-2021-47806 in service configurations before exploitation occurs.

NVD Description

Dup Scout 13.5.28 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in 'C:\Program Files\Dup Scout Server\bin\dupscts.exe' to inject malicious executables and escalate…

more

privileges.

Deeper analysisAI

CVE-2021-47806 is an unquoted service path vulnerability in Dup Scout version 13.5.28. The flaw exists in the Windows service configuration for the executable at 'C:\Program Files\Dup Scout Server\bin\dupscts.exe', where the path lacks proper quoting. This issue, classified under CWE-428, enables local attackers to potentially execute arbitrary code. The vulnerability received a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-01-16.

Local attackers with low privileges can exploit the unquoted path by placing malicious executables in intermediate directories along the service path, such as C:\Program.exe, causing the service to execute the attacker's code instead of the legitimate binary upon service startup or restart. Successful exploitation allows privilege escalation, granting high-impact access to confidentiality, integrity, and availability.

Advisories and proof-of-concept exploits are documented in references including https://www.exploit-db.com/exploits/50025 and https://www.vulncheck.com/advisories/dup-scout-multiple-unquoted-service-path, with the vendor site at https://www.dupscout.com. A public exploit confirms practical exploitability in laboratory conditions.

Details

CWE(s)

Affected Products

flexense
dup scout
13.5.28

CVEs Like This One

CVE-2021-47809Same vendor: Flexense
CVE-2020-37100Same vendor: Flexense
CVE-2021-47807Same vendor: Flexense
CVE-2020-36930Same vendor: Flexense
CVE-2021-47805Same vendor: Flexense
CVE-2020-36927Same vendor: Flexense
CVE-2025-59893Same vendor: Flexense
CVE-2025-59891Same vendor: Flexense
CVE-2020-36946Same vendor: Flexense
CVE-2025-59894Same vendor: Flexense

References