Headline
CVE-2023-32163: ZDI-23-742
Wacom Drivers for Windows Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Wacom Drivers for Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the Tablet Service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-16857.
May 26th, 2023
(0Day) Wacom Drivers for Windows Link Following Local Privilege Escalation Vulnerability****ZDI-23-742
ZDI-CAN-16857
CVE ID
CVE-2023-32163
CVSS SCORE
7.8, (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
AFFECTED VENDORS
Wacom
AFFECTED PRODUCTS
Drivers for Windows
VULNERABILITY DETAILS
This vulnerability allows local attackers to escalate privileges on affected installations of Wacom Drivers for Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the Tablet Service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
ADDITIONAL DETAILS
08/04/22 – ZDI reported the vulnerability to the vendor.
08/04/22 – The vendor acknowledged the report.
01/26/23 – ZDI asked for an update.
03/02/23 – ZDI asked for an update.
05/23/23 – The ZDI informed the vendor that the case will be published as a zero-day advisory on 05/26/23.
– Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application.
DISCLOSURE TIMELINE
- 2022-08-04 - Vulnerability reported to vendor
- 2023-05-26 - Coordinated public release of advisory
CREDIT
Luca Barile - https://lucabarile.github.io/
BACK TO ADVISORIES