


Perceptive Security
SOC/SIEM Consultancy

WibuKey Runtime 6.51 contains an unquoted service path vulnerability in the WkSvW32.exe service that allows local attackers to potentially execute arbitrary cod…
Published:
15 January 2026 at 23:00:00
Alert date:
16 January 2026 at 01:13:28
Source:
nvd.nist.gov
Enterprise Applications, Operating Systems
WibuKey Runtime 6.51 contains an unquoted service path vulnerability in the WkSvW32.exe service that enables local privilege escalation. Attackers can exploit the unquoted path 'C:\PROGRAM FILES (X86)\WIBUKEY\SERVER\WkSvW32.exe' to inject malicious executables. This vulnerability allows local attackers to potentially execute arbitrary code with elevated privileges. The flaw affects the WibuKey licensing software commonly used for software protection and licensing management.
Technical details
Mitigation steps:
Affected products:
WibuKey Runtime
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2021-47810
https://www.exploit-db.com/exploits/49999
https://www.vulncheck.com/advisories/wibukey-runtime-wksvwexe-unquoted-service-path
https://www.wibu.com
https://www.wibu.com/us/support/user/downloads-user-software.html
Related CVE's:
Related threat actors:
IOC's:
C:\PROGRAM FILES (X86)\WIBUKEY\SERVER\WkSvW32.exe
This article was created with the assistance of AI technology by Perceptive.
