In ListCheck.exe in Acer Care Center 4.x before 4.00.3038, a vulnerability in the loading mechanism of Windows DLLs could allow a local attacker to perform a DLL hijacking attack. This vulnerability is due to incorrect handling of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with local administrator privileges.
References
Link | Resource |
---|---|
https://acercsi.com | Broken Link |
https://aptw.tf/2022/01/20/acer-care-center-privesc.html | Exploit Third Party Advisory |
https://community.acer.com/en/kb/articles/14757-acer-care-center-requires-an-update-to-resolve-a-security-vulnerability | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-01-26T14:59:34
Updated: 2022-01-26T14:59:34
Reserved: 2022-01-01T00:00:00
Link: CVE-2021-45975
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-01-26T15:15:07.693
Modified: 2022-02-02T15:51:10.403
Link: CVE-2021-45975
JSON object: View
Redhat Information
No data.
CWE