Cyber Posture

CVE-2021-47809

HighPublic PoC

Published: 16 January 2026

Published
16 January 2026
Modified
30 January 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2021-47809 is a high-severity Unquoted Search Path or Element (CWE-428) vulnerability in Flexense Disk Sorter. Its CVSS base score is 7.8 (High).

Operationally, ranked at the 0.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces secure configuration settings for services, including proper quoting of executable paths to directly prevent unquoted service path exploitation.

prevent

Provides processes to identify, report, and remediate the specific unquoted service path flaw through patching or reconfiguration.

prevent

Maintains a secure baseline configuration that specifies correctly quoted service paths, preventing deployment of vulnerable service setups.

NVD Description

Disk Sorter Enterprise 13.6.12 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in 'C:\Program Files\Disk Sorter Enterprise\bin\disksrs.exe' to inject malicious executables and…

more

escalate privileges.

Deeper analysisAI

CVE-2021-47809 is an unquoted service path vulnerability in Disk Sorter Enterprise version 13.6.12. The flaw exists in the Windows service configuration for the path 'C:\Program Files\Disk Sorter Enterprise\bin\disksrs.exe', which lacks proper quoting. This allows local attackers to potentially execute arbitrary code by placing malicious executables in searchable directories that precede the legitimate binary in the system's PATH.

Local attackers with low privileges (AV:L/AC:L/PR:L) can exploit the unquoted path to inject malicious executables, leading to privilege escalation. Successful exploitation grants high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), as reflected in its CVSS v3.1 base score of 7.8. The vulnerability is classified under CWE-428 (Unquoted Search Path).

Advisories and related resources include the vendor site at https://www.disksorter.com, a VulnCheck advisory at https://www.vulncheck.com/advisories/disk-sorter-enterprise-disk-sorter-enterprise-unquoted-service-path, and a proof-of-concept exploit documented on Exploit-DB at https://www.exploit-db.com/exploits/50014. Specific patch or mitigation guidance is referenced in these sources, published on 2026-01-16.

Details

CWE(s)

Affected Products

flexense
disk sorter
13.6.12

CVEs Like This One

CVE-2020-37100Same vendor: Flexense
CVE-2021-47807Same vendor: Flexense
CVE-2020-36930Same vendor: Flexense
CVE-2021-47806Same vendor: Flexense
CVE-2021-47805Same vendor: Flexense
CVE-2020-36927Same vendor: Flexense
CVE-2025-59893Same vendor: Flexense
CVE-2025-59891Same vendor: Flexense
CVE-2020-36946Same vendor: Flexense
CVE-2025-59894Same vendor: Flexense

References