Vulnerability Description
Acer Care Center 4.00.30xx before 4.00.3042 contains a local privilege escalation vulnerability. The user process communicates with a service of system authority called ACCsvc through a named pipe. In this case, the Named Pipe is also given Read and Write rights to the general user. In addition, the service program does not verify the user when communicating. A thread may exist with a specific command. When the path of the program to be executed is sent, there is a local privilege escalation in which the service program executes the path with system privileges.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Acer | Care Center | >= 4.00.3000, < 4.00.3042 |
Related Weaknesses (CWE)
References
- https://community.acer.com/en/kb/articles/14761MitigationVendor Advisory
- https://community.acer.com/en/kb/articles/14761MitigationVendor Advisory
FAQ
What is CVE-2022-24285?
CVE-2022-24285 is a vulnerability with a CVSS score of 7.8 (HIGH). Acer Care Center 4.00.30xx before 4.00.3042 contains a local privilege escalation vulnerability. The user process communicates with a service of system authority called ACCsvc through a named pipe. In...
How severe is CVE-2022-24285?
CVE-2022-24285 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-24285?
Check the references section above for vendor advisories and patch information. Affected products include: Acer Care Center.