CVE Vulnerabilities

CVE-2023-38817

Improper Privilege Management

Published: Oct 11, 2023 | Modified: Nov 21, 2024
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

An issue in Inspect Element Ltd Echo.ac v.5.2.1.0 allows a local attacker to gain privileges via a crafted command to the echo_driver.sys component. NOTE: the vendors position is that the reported ability for user-mode applications to execute code as NT AUTHORITYSYSTEM was deactivated by Microsoft itself.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

NameVendorStart VersionEnd Version
Anti_cheat_toolEcho*5.2.1.0 (excluding)

Potential Mitigations

References