First published: Wed Sep 28 2022(Updated: )
Armoury Crate Service’s logging function has insufficient validation to check if the log file is a symbolic link. A physical attacker with general user privilege can modify the log file property to a symbolic link that points to arbitrary system file, causing the logging function to overwrite the system file and disrupt the system.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Armoury Crate Service | <5.2.10.0 |
Update Armoury Crate Service version to V5.2.10.0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38699 refers to a vulnerability in Armoury Crate Service's logging function that allows a physical attacker to overwrite arbitrary system files by modifying the log file property to a symbolic link.
CVE-2022-38699 has a severity rating of 5.9, which is considered medium.
Versions of Asus Armoury Crate Service up to and excluding 5.2.10.0 are affected by CVE-2022-38699.
A physical attacker with general user privilege can modify the log file property to a symbolic link that points to arbitrary system files, causing the logging function to overwrite the system files.
You can find more information about CVE-2022-38699 at the following link: https://www.twcert.org.tw/tw/cp-132-6522-4eacb-1.html