An issue in Inspect Element Ltd Echo.ac v.5.2.1.0 allows a local attacker to gain privileges via a crafted command to the echo_driver.sys component. NOTE: the vendors position is that the reported ability for user-mode applications to execute code as NT AUTHORITYSYSTEM was deactivated by Microsoft itself.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Anti_cheat_tool | Echo | * | 5.2.1.0 (excluding) |