Wacom Drivers for Windows Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Wacom Drivers for Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the Tablet Service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-16857.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-742 |
History
Thu, 26 Sep 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wacom drivers For Windows
|
|
CPEs | cpe:2.3:a:wacom:drivers_for_windows:*:*:*:*:*:*:*:* | |
Vendors & Products |
Wacom drivers For Windows
|
|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: zdi
Published: 2023-09-06T04:02:41.021Z
Updated: 2024-09-26T20:43:12.410Z
Reserved: 2023-05-03T20:10:47.062Z
Link: CVE-2023-32163
Vulnrichment
Updated: 2024-08-02T15:10:23.922Z
NVD
Status : Modified
Published: 2023-09-06T05:15:42.347
Modified: 2024-11-21T08:02:49.607
Link: CVE-2023-32163
Redhat
No data.