Advisory Details

May 26th, 2023

(0Day) Wacom Drivers for Windows Link Following Local Privilege Escalation Vulnerability

ZDI-23-742
ZDI-CAN-16857

CVE ID CVE-2023-32163
CVSS SCORE 7.8, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Wacom
AFFECTED PRODUCTS Drivers for Windows
VULNERABILITY DETAILS

This vulnerability allows local attackers to escalate privileges on affected installations of Wacom Drivers for Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the Tablet Service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.

ADDITIONAL DETAILS

08/04/22 – ZDI reported the vulnerability to the vendor.

08/04/22 – The vendor acknowledged the report.

01/26/23 – ZDI asked for an update.

03/02/23 – ZDI asked for an update.

05/23/23 – The ZDI informed the vendor that the case will be published as a zero-day advisory on 05/26/23.

-- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application.


DISCLOSURE TIMELINE
  • 2022-08-04 - Vulnerability reported to vendor
  • 2023-05-26 - Coordinated public release of advisory
CREDIT Luca Barile - https://lucabarile.github.io/
BACK TO ADVISORIES