Cyber Posture

CVE-2021-47847

HighPublic PoC

Published: 16 January 2026

Published
16 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2021-47847 is a high-severity Unquoted Search Path or Element (CWE-428) vulnerability in Disksorter (inferred from references). Its CVSS base score is 7.8 (High).

Operationally, ranked at the 0.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and RA-5 (Vulnerability Monitoring and Scanning).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces and monitors secure configuration settings for system services, including proper quoting of binary paths to directly prevent unquoted service path exploitation like CVE-2021-47847.

detect

Conducts vulnerability scanning that specifically identifies unquoted service path misconfigurations as in CVE-2021-47847 for timely remediation.

prevent

Develops and maintains baseline configurations that specify correctly quoted service binary paths, preventing deployment of vulnerable service setups exploited by this CVE.

NVD Description

Disk Sorter Server 13.6.12 contains an unquoted service path vulnerability in its binary path configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in 'C:\Program Files\Disk Sorter Server\bin\disksrs.exe' to inject malicious executables and…

more

escalate privileges.

Deeper analysisAI

CVE-2021-47847 is an unquoted service path vulnerability in Disk Sorter Server version 13.6.12. The flaw exists in the binary path configuration for 'C:\Program Files\Disk Sorter Server\bin\disksrs.exe', which lacks proper quoting around spaces in the path. This allows local attackers to potentially execute arbitrary code by exploiting the unquoted path. The vulnerability is associated with CWE-428 and has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Local low-privileged attackers can exploit this issue by placing a malicious executable in a directory that the Windows service resolves before the intended binary due to the unquoted path. Successful exploitation enables privilege escalation through arbitrary code execution, resulting in high impacts to confidentiality, integrity, and availability.

Advisories and related resources, including those from VulnCheck at https://www.vulncheck.com/advisories/disk-sorter-server-disk-sorter-server-unquoted-service-path, an exploit PoC at https://www.exploit-db.com/exploits/50013, and the vendor site at https://www.disksorter.com, provide further details on the issue, though specific patch information is not detailed in the available references. A public exploit demonstrates practical exploitation potential.

Details

CWE(s)

Affected Products

Disksorter
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2019-25276Shared CWE-428
CVE-2020-37098Shared CWE-428
CVE-2021-47809Shared CWE-428
CVE-2024-57276Shared CWE-428
CVE-2020-37100Shared CWE-428
CVE-2021-47790Shared CWE-428
CVE-2020-36976Shared CWE-428
CVE-2021-47787Shared CWE-428
CVE-2021-47833Shared CWE-428
CVE-2021-47861Shared CWE-428

References