First published: Tue Dec 17 2019(Updated: )
In the Quick Access Service (QAAdminAgent.exe) in Acer Quick Access V2.01.3000 through 2.01.3027 and V3.00.3000 through V3.00.3008, a REGULAR user can load an arbitrary unsigned DLL into the signed service's process, which is running as NT AUTHORITY\SYSTEM. This is a DLL Hijacking vulnerability (including search order hijacking, which searches for the missing DLL in the PATH environment variable), which is caused by an uncontrolled search path element for nvapi.dll, atiadlxx.dll, or atiadlxy.dll.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Acer Quick Access | >=2.01.3000<=2.01.3027 | |
Acer Quick Access | >=3.00.3000<=3.00.3008 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18670 is a DLL Hijacking vulnerability in Acer Quick Access.
CVE-2019-18670 has a severity score of 7.8, which is considered high.
CVE-2019-18670 allows a regular user to load an arbitrary unsigned DLL into the signed service's process, which is running as NT AUTHORITY\SYSTEM.
CVE-2019-18670 affects Acer Quick Access versions 2.01.3000 through 2.01.3027 and versions 3.00.3000 through 3.00.3008.
To fix CVE-2019-18670, it is recommended to update Acer Quick Access to a version that is not affected by the vulnerability.