CVE-2022-38699
ASUS Armoury Crate Service - Arbitrary File Creation via Elevation of Privilege Flaw
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Armoury Crate Service’s logging function has insufficient validation to check if the log file is a symbolic link. A physical attacker with general user privilege can modify the log file property to a symbolic link that points to arbitrary system file, causing the logging function to overwrite the system file and disrupt the system.
La función logging de Armoury Crate Service presenta una comprobación insuficiente para comprobar si el archivo de registro es un enlace simbólico. Un atacante físico con privilegio de usuario general puede modificar la propiedad del archivo de registro a un enlace simbólico que apunte a un archivo de sistema arbitrario, causando que la función de registro sobrescriba el archivo de sistema y perturbe el sistema
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-08-23 CVE Reserved
- 2022-09-28 CVE Published
- 2024-04-07 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://www.twcert.org.tw/tw/cp-132-6522-4eacb-1.html | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Asus Search vendor "Asus" | Armoury Crate Service Search vendor "Asus" for product "Armoury Crate Service" | < 5.2.10.0 Search vendor "Asus" for product "Armoury Crate Service" and version " < 5.2.10.0" | - |
Affected
|