<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>VX Search — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/vx-search/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:21:44 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/vx-search/feed.xml" rel="self" type="application/rss+xml"/><item><title>VX Search Unquoted Service Path Privilege Escalation (CVE-2021-47974)</title><link>https://feed.craftedsignal.io/briefs/2026-05-vxsearch-privesc/</link><pubDate>Sat, 16 May 2026 16:21:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-vxsearch-privesc/</guid><description>VX Search 13.5.28 is vulnerable to an unquoted service path vulnerability (CVE-2021-47974) in both VX Search Server and VX Search Enterprise services, allowing local attackers to escalate privileges by placing malicious executables in unquoted path directories.</description><content:encoded><![CDATA[<p>VX Search 13.5.28 contains an unquoted service path vulnerability (CVE-2021-47974) affecting both VX Search Server and VX Search Enterprise services. This vulnerability allows a local attacker to escalate privileges to LocalSystem. The vulnerability exists due to the lack of proper quoting around the service executable path, allowing for arbitrary code execution. Successful exploitation requires placing a malicious executable in a directory along the service path. This issue was reported on May 16, 2026. Defenders should ensure the service path is properly quoted or upgrade to a patched version if available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial local access to the system with a low-privilege account.</li>
<li>The attacker identifies the unquoted service path for VX Search Server or VX Search Enterprise (e.g., C:\Program Files\VX Search).</li>
<li>The attacker creates a malicious executable (e.g., C:\Program.exe).</li>
<li>The attacker places the malicious executable in the first directory in the unquoted service path (e.g., C:\Program Files\VX Search\VXSearchService.exe).</li>
<li>The attacker restarts the VX Search service, either directly or by rebooting the system.</li>
<li>The operating system attempts to execute the service, but due to the unquoted path, it first executes the malicious executable (C:\Program.exe) with LocalSystem privileges.</li>
<li>The malicious executable performs its intended actions, such as creating new administrator accounts or installing malware.</li>
<li>The attacker now has elevated privileges and can perform arbitrary actions on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to gain complete control of the affected system, due to arbitrary code execution as SYSTEM. This can lead to data theft, system compromise, and potentially lateral movement within the network. Given the nature of VX Search, which is used for file indexing and searching, successful exploitation could also compromise sensitive data stored on the system or network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enclose the service path in double quotes to prevent the operating system from misinterpreting the path (reference CVE-2021-47974).</li>
<li>Monitor process creation events for executables running from unusual paths, especially those matching the prefix of &ldquo;C:\Program Files&quot; using the Sigma rule <code>Detect Unquoted Service Path Exploitation</code>.</li>
<li>Implement access controls to restrict who can write to directories in the service path.</li>
<li>Regularly review and audit service configurations for unquoted paths.</li>
<li>Consider using application control solutions to prevent unauthorized executables from running.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>unquoted service path</category><category>cve-2021-47974</category></item></channel></rss>