Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 05 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:honeywell:win-pak:4.8:*:*:*:*:*:*:* |
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Honeywell
Honeywell win-pak |
|
| Vendors & Products |
Honeywell
Honeywell win-pak |
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 21 Jan 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WIN-PACK PRO 4.8 contains an unquoted service path vulnerability in the WPCommandFileService that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in C:\Program Files <x86>\WINPAKPRO\WPCommandFileService Service.exe to inject malicious code that would execute with LocalSystem permissions. | |
| Title | WIN-PACK PRO 4.8 - 'WPCommandFileService' Unquoted Service Path | |
| Weaknesses | CWE-428 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T01:29:00.395Z
Reserved: 2026-01-18T12:35:05.171Z
Link: CVE-2021-47868
Updated: 2026-01-22T16:47:12.285Z
Status : Deferred
Published: 2026-01-21T18:16:19.023
Modified: 2026-04-15T00:35:42.020
Link: CVE-2021-47868
No data.
OpenCVE Enrichment
Updated: 2026-01-22T10:08:49Z