<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Surveillance DVR 4.0 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/surveillance-dvr-4.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 10 May 2026 13:21:39 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/surveillance-dvr-4.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>Argus Surveillance DVR Unquoted Service Path Vulnerability (CVE-2021-47945)</title><link>https://feed.craftedsignal.io/briefs/2026-05-argus-dvr-unquoted-path/</link><pubDate>Sun, 10 May 2026 13:21:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-argus-dvr-unquoted-path/</guid><description>Argus Surveillance DVR 4.0 contains an unquoted service path vulnerability in the DVRWatchdog service (CVE-2021-47945), enabling local attackers to escalate privileges by placing a malicious executable in the Program Files directory to be executed as LocalSystem.</description><content:encoded><![CDATA[<p>Argus Surveillance DVR 4.0 is vulnerable to an unquoted service path vulnerability (CVE-2021-47945) affecting the DVRWatchdog service. This flaw allows a local attacker to achieve privilege escalation on the system. By exploiting the lack of proper quoting in the service&rsquo;s executable path, a malicious actor can insert a rogue executable into a directory along the service&rsquo;s path, typically within the &lsquo;Program Files&rsquo; directory. Upon service restart, the operating system may inadvertently execute the attacker&rsquo;s malicious code instead of the intended legitimate binary, effectively granting the attacker LocalSystem privileges. This vulnerability poses a significant risk to systems where Argus Surveillance DVR 4.0 is installed, as it allows for unauthorized access and control over the affected machine.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to the target system.</li>
<li>The attacker identifies the unquoted service path vulnerability in the DVRWatchdog service.</li>
<li>The attacker crafts a malicious executable.</li>
<li>The attacker places the malicious executable in a directory that precedes the actual service executable in the unquoted path (e.g., <code>C:\Program Files\Argus\DVRWatchdog.exe</code> is vulnerable, attacker places <code>C:\Program.exe</code>).</li>
<li>The attacker triggers a restart of the DVRWatchdog service. This can be achieved through various methods, such as using the <code>services.msc</code> management console, PowerShell commands, or by restarting the entire system.</li>
<li>The operating system attempts to execute the DVRWatchdog service using the unquoted path. Due to the lack of quotes, the OS misinterprets the path and executes the attacker&rsquo;s malicious executable.</li>
<li>The malicious executable runs with LocalSystem privileges.</li>
<li>The attacker now has elevated privileges and can perform arbitrary actions on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to escalate their privileges to LocalSystem. This grants the attacker complete control over the affected system, enabling them to install software, modify data, create new accounts with full administrative rights, and perform other malicious activities. Given the nature of surveillance DVR systems, attackers may also gain access to sensitive video and audio recordings, potentially leading to privacy breaches and further exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the vendor-supplied patch or upgrade to a version of Argus Surveillance DVR that addresses CVE-2021-47945 if available.</li>
<li>Enclose the service path in quotes to prevent exploitation of the unquoted service path vulnerability. This can be achieved by modifying the service configuration using <code>sc.exe config &quot;DVRWatchdog&quot; binPath= &quot;\&quot;C:\Program Files\Argus\DVR\DVRWatchdog.exe\&quot;&quot;</code>.</li>
<li>Monitor for process creations from unusual locations within the Program Files directory using the Sigma rule <code>Detect Suspicious Process Creation in Program Files</code>.</li>
<li>Implement strict access control policies to limit the ability of local users to write files to system directories like <code>Program Files</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>unquoted-service-path</category><category>privilege-escalation</category><category>windows</category></item></channel></rss>