First published: Thu Oct 24 2019(Updated: )
An exploitable privilege escalation vulnerability exists in the Wacom, driver version 6.3.32-3, update helper service in the startProcess command. The command takes a user-supplied script argument and executes it under root context. A user with local access can use this vulnerability to raise their privileges to root. An attacker would need local access to the machine for a successful exploit.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wacom Driver | =6.3.32-3 | |
Apple macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this exploit is CVE-2019-5012.
CVE-2019-5012 has a severity rating of 7.8 (high).
The Wacom driver version 6.3.32-3 is affected by CVE-2019-5012.
A local user can exploit CVE-2019-5012 by using the Wacom driver update helper service and providing a malicious script argument to elevate their privileges.
No, Apple macOS is not affected by CVE-2019-5012.
Yes, you can find more information about CVE-2019-5012 at the following link: [https://talosintelligence.com/vulnerability_reports/TALOS-2019-0760](https://talosintelligence.com/vulnerability_reports/TALOS-2019-0760)