CVE-2021-47847
Published: 16 January 2026
Summary
CVE-2021-47847 is a high-severity Unquoted Search Path or Element (CWE-428) vulnerability in Disksorter (inferred from references). Its CVSS base score is 7.8 (High).
Operationally, ranked at the 0.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and RA-5 (Vulnerability Monitoring and Scanning).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces and monitors secure configuration settings for system services, including proper quoting of binary paths to directly prevent unquoted service path exploitation like CVE-2021-47847.
Conducts vulnerability scanning that specifically identifies unquoted service path misconfigurations as in CVE-2021-47847 for timely remediation.
Develops and maintains baseline configurations that specify correctly quoted service binary paths, preventing deployment of vulnerable service setups exploited by this CVE.
NVD Description
Disk Sorter Server 13.6.12 contains an unquoted service path vulnerability in its binary path configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in 'C:\Program Files\Disk Sorter Server\bin\disksrs.exe' to inject malicious executables and…
more
escalate privileges.
Deeper analysisAI
CVE-2021-47847 is an unquoted service path vulnerability in Disk Sorter Server version 13.6.12. The flaw exists in the binary path configuration for 'C:\Program Files\Disk Sorter Server\bin\disksrs.exe', which lacks proper quoting around spaces in the path. This allows local attackers to potentially execute arbitrary code by exploiting the unquoted path. The vulnerability is associated with CWE-428 and has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Local low-privileged attackers can exploit this issue by placing a malicious executable in a directory that the Windows service resolves before the intended binary due to the unquoted path. Successful exploitation enables privilege escalation through arbitrary code execution, resulting in high impacts to confidentiality, integrity, and availability.
Advisories and related resources, including those from VulnCheck at https://www.vulncheck.com/advisories/disk-sorter-server-disk-sorter-server-unquoted-service-path, an exploit PoC at https://www.exploit-db.com/exploits/50013, and the vendor site at https://www.disksorter.com, provide further details on the issue, though specific patch information is not detailed in the available references. A public exploit demonstrates practical exploitation potential.
Details
- CWE(s)