CVE-2023-38817

An issue in Inspect Element Ltd Echo.ac v.5.2.1.0 allows a local attacker to gain privileges via a crafted command to the echo_driver.sys component. NOTE: the vendor's position is that the reported ability for user-mode applications to execute code as NT AUTHORITY\SYSTEM was "deactivated by Microsoft itself."
References
Link Resource
https://ioctl.fail/echo-ac-writeup/ Exploit Third Party Advisory
https://ioctl.fail/echo-ac-writeup/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:echo:anti_cheat_tool:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:14

Type Values Removed Values Added
References () https://ioctl.fail/echo-ac-writeup/ - Exploit, Third Party Advisory () https://ioctl.fail/echo-ac-writeup/ - Exploit, Third Party Advisory

24 Apr 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-11 19:15

Updated : 2024-11-21 08:14


NVD link : CVE-2023-38817

Mitre link : CVE-2023-38817

CVE.ORG link : CVE-2023-38817


JSON object : View

Products Affected

echo

  • anti_cheat_tool
CWE
CWE-269

Improper Privilege Management