CVE-2023-38817

An issue in Inspect Element Ltd Echo.ac v.5.2.1.0 allows a local attacker to gain privileges via a crafted command to the echo_driver.sys component. NOTE: the vendor's position is that the reported ability for user-mode applications to execute code as NT AUTHORITY\SYSTEM was "deactivated by Microsoft itself."
References
Link Resource
https://ioctl.fail/echo-ac-writeup/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:echo:anti_cheat_tool:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-10-11 19:15

Updated : 2024-07-09 18:15


NVD link : CVE-2023-38817

Mitre link : CVE-2023-38817

CVE.ORG link : CVE-2023-38817


JSON object : View

Products Affected

echo

  • anti_cheat_tool
CWE
CWE-269

Improper Privilege Management