Impact
PredatorSense V3 exposes a Windows Named Pipe that incorrectly allows any authenticated local user to send messages via a custom protocol, invoking internal functions that are meant to run with SYSTEM privileges. The misconfiguration permits the attacker to execute arbitrary code with full SYSTEM rights and delete any file on the system. This elevates local users to system-level authority, enabling full control over the affected machine.
Affected Systems
Acer PredatorSense V3 versions ranging from 3.00.3136 to 3.00.3196 are vulnerable. Updating the software to version 3.00.3198 removes the misconfigured named pipe and eliminates the exploit path.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.5, indicating high severity. The EPSS score is not available and the issue is not listed in the CISA KEV catalog, suggesting no publicly known exploits yet. Nonetheless, an authenticated local user can exploit the exposed named pipe, making it a low-barrier attack for insiders or opportunistic malware. The reliance on local authentication means the threat surface is limited to the target machine, but the impact is total system compromise due to SYSTEM privileges.
OpenCVE Enrichment