Source: Ministry of education information & communication security contingency platform
Publication Number | TACERT-ANA-2025061709060505 | Publication Time | 2025/06/17 09:04 |
Incident Type | ANA-Vulnerability Alert | Discovery Time | 2025/06/17 09:04 |
Impact Level | Low | ||
[Subject] [Vulnerability Alert] Remote Code Execution Vulnerability in Acer ControlCenter |
|||
[Content] Forwarded from TWCERTCC-200-202506-00000009 Acer ControlCenter - Remote Code Execution (CVE-2025-5491, CVSS: 8.8) A remote code execution vulnerability has been identified in Acer ControlCenter. The software exposes functionality via a custom Windows Named Pipe, which is misconfigured to allow low-privileged remote users to interact with it and access associated features. One such feature permits the execution of arbitrary programs under the NT AUTHORITY/SYSTEM account, enabling attackers to run arbitrary code with elevated privileges on the target system. Information Sharing Level: WHITE (Information content can be publicly disclosed) |
|||
[Affected Platform] Acer ControlCenter versions 4.00.3000 to 4.00.3056 |
|||
[Recommended Actions] Update to version 4.00.3058 or later |
|||
[Reference] https://www.twcert.org.tw/tw/cp-132-10180-36818-1.html |