Lucene search

K
cve[email protected]CVE-2022-48221
HistoryApr 04, 2023 - 3:15 p.m.

CVE-2022-48221

2023-04-0415:15:08
CWE-362
web.nvd.nist.gov
18
acuant
acufill
sdk
vulnerability
cve-2022-48221
privilege escalation
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

41.2%

An issue was discovered in Acuant AcuFill SDK before 10.22.02.03. Multiple MSI’s get executed out of a standard-user writable directory. Through a race condition and OpLock manipulation, these files can be overwritten by a standard user. They then get executed by the elevated installer. This gives a standard user full SYSTEM code execution (elevation of privileges).

Affected configurations

NVD
Node
gbgplcacuant_acufill_sdkRange<10.22.02.03

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

41.2%

Related for CVE-2022-48221