Description
The C:\Windows\Temp\Agent.Package.Availability\Agent.Package.Availability.exe file is automatically launched as SYSTEM when the system reboots. Since the C:\Windows\Temp\Agent.Package.Availability folder inherits permissions from C:\Windows\Temp and Agent.Package.Availability.exe is susceptible to DLL hijacking, standard users can write a malicious DLL to it and elevate their privileges.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-41163 | The C:\Windows\Temp\Agent.Package.Availability\Agent.Package.Availability.exe file is automatically launched as SYSTEM when the system reboots. Since the C:\Windows\Temp\Agent.Package.Availability folder inherits permissions from C:\Windows\Temp and Agent.Package.Availability.exe is susceptible to DLL hijacking, standard users can write a malicious DLL to it and elevate their privileges. |
References
History
No history.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-09-05T17:45:07.238Z
Reserved: 2023-06-29T10:33:40.828Z
Link: CVE-2023-37243
Updated: 2024-08-02T17:09:33.213Z
Status : Modified
Published: 2023-10-31T15:15:08.993
Modified: 2024-11-21T08:11:17.540
Link: CVE-2023-37243
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD