Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:acer:quick_access:*:*:*:*:*:*:*:*", "matchCriteriaId": "2318EA68-24A8-4F5F-B199-3AA7A0377818", "versionEndIncluding": "2.01.3027", "versionStartIncluding": "2.01.3000", "vulnerable": true}, {"criteria": "cpe:2.3:a:acer:quick_access:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E89948C-DA2D-4988-8477-B7D147408037", "versionEndIncluding": "3.00.3008", "versionStartIncluding": "3.00.3000", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "In the Quick Access Service (QAAdminAgent.exe) in Acer Quick Access V2.01.3000 through 2.01.3027 and V3.00.3000 through V3.00.3008, a REGULAR user can load an arbitrary unsigned DLL into the signed service's process, which is running as NT AUTHORITY\\SYSTEM. This is a DLL Hijacking vulnerability (including search order hijacking, which searches for the missing DLL in the PATH environment variable), which is caused by an uncontrolled search path element for nvapi.dll, atiadlxx.dll, or atiadlxy.dll."}, {"lang": "es", "value": "En el Quick Access Service (QAAdminAgent.exe) en Acer Quick Access versiones V2.01.3000 hasta 2.01.3027 y versi\u00f3n V3.00.3000 hasta V3.00.3008, un usuario REGULAR puede cargar una DLL arbitraria sin firmar en el proceso del servicio firmado, que es ejecutado como NT AUTHORITY\\SYSTEM. Esta es una vulnerabilidad de secuestro de DLL (incluido el secuestro de orden de b\u00fasqueda, que busca la DLL que falta en la variable de entorno PATH), que es causada por un elemento de ruta de b\u00fasqueda no controlada para las bibliotecas nvapi.dll, atiadlxx.dll o atiadlxy.dll."}], "id": "CVE-2019-18670", "lastModified": "2024-11-21T04:33:29.817", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-12-17T16:15:14.483", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://drive.google.com/open?id=1r0cr-H_FMc8V4hwlqF1MAEhSSnztm5sp"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "https://us.answers.acer.com/app/answers/detail/a_id/64586"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://drive.google.com/open?id=1r0cr-H_FMc8V4hwlqF1MAEhSSnztm5sp"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "https://us.answers.acer.com/app/answers/detail/a_id/64586"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-427"}], "source": "nvd@nist.gov", "type": "Primary"}]}