Unquoted Service Path Vulnerability in WibuKey Runtime by Wibu
CVE-2021-47810
Key Information:
- Vendor
Wibu
- Status
- Vendor
- CVE Published:
- 15 January 2026
Badges
What is CVE-2021-47810?
WibuKey Runtime version 6.51 is susceptible to a local code execution vulnerability due to an unquoted service path in the WkSvW32.exe service. This flaw allows local attackers to potentially execute arbitrary code through the exploitation of the unquoted executable path located at 'C:\PROGRAM FILES (X86)\WIBUKEY\SERVER\WkSvW32.exe'. An adversary could craft a malicious executable that could be executed with escalated privileges when this service is started. Users and administrators should promptly review their installations of WibuKey Runtime and apply mitigations to prevent exploitation.
Affected Version(s)
WibuKey Runtime 6.51
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
