Описание
An issue in Inspect Element Ltd Echo.ac v.5.2.1.0 allows a local attacker to gain privileges via a crafted command to the echo_driver.sys component. NOTE: the vendor's position is that the reported ability for user-mode applications to execute code as NT AUTHORITY\SYSTEM was "deactivated by Microsoft itself."
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 5.2.1.0 (исключая)
cpe:2.3:a:echo:anti_cheat_tool:*:*:*:*:*:*:*:*
EPSS
Процентиль: 43%
0.00205
Низкий
7.8 High
CVSS3
Дефекты
CWE-269
Связанные уязвимости
CVSS3: 7.8
github
больше 2 лет назад
An issue in Inspect Element Ltd Echo.ac v.5.2.1.0 allows a local attacker to gain privileges via a crafted command to the echo_driver.sys component.
EPSS
Процентиль: 43%
0.00205
Низкий
7.8 High
CVSS3
Дефекты
CWE-269