In ListCheck.exe in Acer Care Center 4.x before 4.00.3038, a vulnerability in the loading mechanism of Windows DLLs could allow a local attacker to perform a DLL hijacking attack. This vulnerability is due to incorrect handling of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with local administrator privileges.
References
Link | Resource |
---|---|
https://aptw.tf/2022/01/20/acer-care-center-privesc.html | Exploit Third Party Advisory |
https://acercsi.com | Broken Link |
https://community.acer.com/en/kb/articles/14757-acer-care-center-requires-an-update-to-resolve-a-security-vulnerability | Vendor Advisory |
Configurations
Information
Published : 2022-01-26 07:15
Updated : 2022-02-02 07:51
NVD link : CVE-2021-45975
Mitre link : CVE-2021-45975
JSON object : View
CWE
CWE-426
Untrusted Search Path
Products Affected
acer
- care_center