5 results (0.004 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

ASUS Armoury Crate has a vulnerability in arbitrary file write and allows remote attackers to access or modify arbitrary files by sending specific HTTP requests without permission. ASUS Armory Crate tiene una vulnerabilidad en la escritura de archivos arbitrarios y permite a atacantes remotos acceder o modificar archivos arbitrarios enviando solicitudes HTTP específicas sin permiso. • https://www.twcert.org.tw/tw/cp-132-7666-fffce-1.html • CWE-610: Externally Controlled Reference to a Resource in Another Sphere •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

ASUS SetupAsusServices v1.0.5.1 in Asus Armoury Crate v5.3.4.0 contains an unquoted service path vulnerability which allows local users to launch processes with elevated privileges. • http://asus.com http://setupasusservices.com https://irradiate.com.au/blog/CVE-2023-26911 • CWE-428: Unquoted Search Path or Element •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

ASUS EC Tool driver (aka d.sys) 1beb15c90dcf7a5234ed077833a0a3e900969b60be1d04fcebce0a9f8994bdbb, as signed by ASUS and shipped with multiple ASUS software products, contains multiple IOCTL handlers that provide raw read and write access to port I/O and MSRs via unprivileged IOCTL calls. Local users can gain privileges. • https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0003.md •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

Armoury Crate Service’s logging function has insufficient validation to check if the log file is a symbolic link. A physical attacker with general user privilege can modify the log file property to a symbolic link that points to arbitrary system file, causing the logging function to overwrite the system file and disrupt the system. La función logging de Armoury Crate Service presenta una comprobación insuficiente para comprobar si el archivo de registro es un enlace simbólico. Un atacante físico con privilegio de usuario general puede modificar la propiedad del archivo de registro a un enlace simbólico que apunte a un archivo de sistema arbitrario, causando que la función de registro sobrescriba el archivo de sistema y perturbe el sistema • https://www.twcert.org.tw/tw/cp-132-6522-4eacb-1.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 1

ASUS ROG Armoury Crate Lite before 4.2.10 allows local users to gain privileges by placing a Trojan horse file in the publicly writable %PROGRAMDATA%\ASUS\GamingCenterLib directory. ASUS ROG Armoury Crate Lite versiones anteriores a 4.2.10, permite a usuarios locales alcanzar privilegios al colocar un archivo troyano en el directorio de escritura pública %PROGRAMDATA%\ASUS\GamingCenterLib • https://aptw.tf/2021/09/24/armoury-crate-privesc.html • CWE-427: Uncontrolled Search Path Element •