Description
An issue in Inspect Element Ltd Echo.ac v.5.2.1.0 allows a local attacker to gain privileges via a crafted command to the echo_driver.sys component. NOTE: the vendor's position is that the reported ability for user-mode applications to execute code as NT AUTHORITY\SYSTEM was "deactivated by Microsoft itself."
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://ioctl.fail/echo-ac-writeup/ |
|
History
Fri, 27 Feb 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T17:54:38.495Z
Reserved: 2023-07-25T00:00:00.000Z
Link: CVE-2023-38817
Updated: 2024-08-02T17:54:38.495Z
Status : Modified
Published: 2023-10-11T19:15:10.180
Modified: 2024-11-21T08:14:13.280
Link: CVE-2023-38817
No data.
OpenCVE Enrichment
No data.
Weaknesses