In the Quick Access Service (QAAdminAgent.exe) in Acer Quick Access V2.01.3000 through 2.01.3027 and V3.00.3000 through V3.00.3008, a REGULAR user can load an arbitrary unsigned DLL into the signed service's process, which is running as NT AUTHORITY\SYSTEM. This is a DLL Hijacking vulnerability (including search order hijacking, which searches for the missing DLL in the PATH environment variable), which is caused by an uncontrolled search path element for nvapi.dll, atiadlxx.dll, or atiadlxy.dll.
                
            References
                    | Link | Resource | 
|---|---|
| https://drive.google.com/open?id=1r0cr-H_FMc8V4hwlqF1MAEhSSnztm5sp | Exploit Third Party Advisory | 
| https://us.answers.acer.com/app/answers/detail/a_id/64586 | Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    No history.
Information
                Published : 2019-12-17 16:15
Updated : 2021-07-21 11:39
NVD link : CVE-2019-18670
Mitre link : CVE-2019-18670
CVE.ORG link : CVE-2019-18670
JSON object : View
Products Affected
                acer
- quick_access
 
CWE
                
                    
                        
                        CWE-427
                        
            Uncontrolled Search Path Element
