Acer ControlCenter contains Remote Code Execution vulnerability. The program exposes a Windows Named Pipe that uses a custom protocol to invoke internal functions. However, this Named Pipe is misconfigured, allowing remote users with low privileges to interact with it and access its features. One such feature enables the execution of arbitrary programs as NT AUTHORITY/SYSTEM. By leveraging this, remote attackers can execute arbitrary code on the target system with elevated privileges.
Metrics
Affected Vendors & Products
References
History
Fri, 13 Jun 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 13 Jun 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Acer ControlCenter contains Remote Code Execution vulnerability. The program exposes a Windows Named Pipe that uses a custom protocol to invoke internal functions. However, this Named Pipe is misconfigured, allowing remote users with low privileges to interact with it and access its features. One such feature enables the execution of arbitrary programs as NT AUTHORITY/SYSTEM. By leveraging this, remote attackers can execute arbitrary code on the target system with elevated privileges. | |
Title | Acer ControlCenter - Remote Code Execution | |
Weaknesses | CWE-269 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: twcert
Published: 2025-06-13T01:56:20.822Z
Updated: 2025-06-13T19:07:10.652Z
Reserved: 2025-06-03T03:57:31.624Z
Link: CVE-2025-5491

Updated: 2025-06-13T19:07:02.957Z

Status : Awaiting Analysis
Published: 2025-06-13T03:15:52.300
Modified: 2025-06-16T12:32:18.840
Link: CVE-2025-5491

No data.