In the Quick Access Service (QAAdminAgent.exe) in Acer Quick Access V2.01.3000 through 2.01.3027 and V3.00.3000 through V3.00.3008, a REGULAR user can load an arbitrary unsigned DLL into the signed service's process, which is running as NT AUTHORITY\SYSTEM. This is a DLL Hijacking vulnerability (including search order hijacking, which searches for the missing DLL in the PATH environment variable), which is caused by an uncontrolled search path element for nvapi.dll, atiadlxx.dll, or atiadlxy.dll.
References
Link | Resource |
---|---|
https://drive.google.com/open?id=1r0cr-H_FMc8V4hwlqF1MAEhSSnztm5sp | Exploit Third Party Advisory |
https://us.answers.acer.com/app/answers/detail/a_id/64586 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2019-12-17 16:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-18670
Mitre link : CVE-2019-18670
CVE.ORG link : CVE-2019-18670
JSON object : View
Products Affected
acer
- quick_access
CWE
CWE-427
Uncontrolled Search Path Element