CVE-2023-38817

An issue in Inspect Element Ltd Echo.ac v.5.2.1.0 allows a local attacker to gain privileges via a crafted command to the echo_driver.sys component. NOTE: the vendor's position is that the reported ability for user-mode applications to execute code as NT AUTHORITY\SYSTEM was "deactivated by Microsoft itself."
References
Link Resource
https://ioctl.fail/echo-ac-writeup/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:echo:anti_cheat_tool:*:*:*:*:*:*:*:*

History

18 Oct 2023, 17:03

Type Values Removed Values Added
References (MISC) https://ioctl.fail/echo-ac-writeup/ - (MISC) https://ioctl.fail/echo-ac-writeup/ - Exploit, Third Party Advisory
CWE CWE-269
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Echo anti Cheat Tool
Echo
CPE cpe:2.3:a:echo:anti_cheat_tool:*:*:*:*:*:*:*:*

13 Oct 2023, 17:15

Type Values Removed Values Added
Summary An issue in Inspect Element Ltd Echo.ac v.5.2.1.0 allows a local attacker to gain privileges via a crafted command to the echo_driver.sys component. An issue in Inspect Element Ltd Echo.ac v.5.2.1.0 allows a local attacker to gain privileges via a crafted command to the echo_driver.sys component. NOTE: the vendor's position is that the reported ability for user-mode applications to execute code as NT AUTHORITY\SYSTEM was "deactivated by Microsoft itself."

11 Oct 2023, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-11 19:15

Updated : 2024-08-02 18:15


NVD link : CVE-2023-38817

Mitre link : CVE-2023-38817

CVE.ORG link : CVE-2023-38817


JSON object : View

Products Affected

echo

  • anti_cheat_tool
CWE
CWE-269

Improper Privilege Management