Jump to the main content block

[Vulnerability Alert] Remote Code Execution Vulnerability in Acer ControlCenter

publish date : 2025-06-19 update date : 2025-06-19

Source: Ministry of education information & communication security contingency platform

Publication Number TACERT-ANA-2025061709060505 Publication Time 2025/06/17 09:04
Incident Type ANA-Vulnerability Alert Discovery Time 2025/06/17 09:04
Impact Level Low  
[Subject]
[Vulnerability Alert] Remote Code Execution Vulnerability in Acer ControlCenter
[Content]
Forwarded from TWCERTCC-200-202506-00000009

Acer ControlCenter - Remote Code Execution (CVE-2025-5491, CVSS: 8.8) A remote code execution vulnerability has been identified in Acer ControlCenter. The software exposes functionality via a custom Windows Named Pipe, which is misconfigured to allow low-privileged remote users to interact with it and access associated features. One such feature permits the execution of arbitrary programs under the NT AUTHORITY/SYSTEM account, enabling attackers to run arbitrary code with elevated privileges on the target system.

Information Sharing Level: WHITE (Information content can be publicly disclosed)
[Affected Platform]
Acer ControlCenter versions 4.00.3000 to 4.00.3056
[Recommended Actions]
Update to version 4.00.3058 or later
[Reference]
https://www.twcert.org.tw/tw/cp-132-10180-36818-1.html
(This notification is for informational purposes only and does not constitute a cybersecurity incident).
If you have questions or suggestions regarding this notification, please feel free to contact us.
Ministry of education information & communication security contingency platform
Website: https://info.cert.tanet.edu.tw/
Phone: +886-7-5250211
Internet Phone: 98400000
E-Mail: service@cert.tanet.edu.tw
Organizer: Computer Center
Click Num: