Exploit/Advisories

Published on October 30th, 2020 📆 | 8246 Views ⚑

0

Program Access Controller 1.2.0.0 Unquoted Service Path ≈ Packet Storm


iSpeech

Program Access Controller 1.2.0.0 Unquoted Service Path
Posted Oct 28, 2020
Authored by Mohammed Alshehri

Program Access Controller version 1.2.0.0 suffers from an unquoted service path vulnerability.

tags | exploit
MD5 | b85f024b05e87fa9c7c8dcc73b7d07af
# Exploit Title: Program Access Controller v1.2.0.0 - 'PACService.exe' Unquoted Service Path
# Date: 2020-8-25
# Exploit Author: Mohammed Alshehri
# Vendor Homepage: https://www.gearboxcomputers.com/
# Software Link: https://www.gearboxcomputers.com/files/ProgramAccessController.exe
# Version: 1.2.0.0
# Tested on: Microsoft Windows 10 Education - 10.0.17763 N/A Build 17763

# Service info:

C:Usersm507>sc qc PACSvc
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: PACSvc
TYPE : 10 WIN32_OWN_PROCESS
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 1 NORMAL
BINARY_PATH_NAME : C:Program Files (x86)Program Access ControllerPACService.exe
LOAD_ORDER_GROUP :
TAG : 0
DISPLAY_NAME : PAC Service
DEPENDENCIES :
SERVICE_START_NAME : LocalSystem





C:Usersm507>

# Exploit:
This vulnerability could permit executing code during startup or reboot with the escalated privileges.

Source link

Tagged with:



Comments are closed.