An issue in Inspect Element Ltd Echo.ac v.5.2.1.0 allows a local attacker to gain privileges via a crafted command to the echo_driver.sys component. NOTE: the vendor's position is that the reported ability for user-mode applications to execute code as NT AUTHORITY\SYSTEM was "deactivated by Microsoft itself."
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://ioctl.fail/echo-ac-writeup/ |
|
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T17:54:38.495Z
Reserved: 2023-07-25T00:00:00
Link: CVE-2023-38817
Updated: 2024-08-02T17:54:38.495Z
Status : Modified
Published: 2023-10-11T19:15:10.180
Modified: 2024-11-21T08:14:13.280
Link: CVE-2023-38817
No data.
OpenCVE Enrichment
No data.
Weaknesses