CVE-2022-24286

7.8 HIGH

📋 TL;DR

Acer QuickAccess software contains a local privilege escalation vulnerability where unprivileged users can communicate with a system service via an insecurely configured named pipe. The service executes arbitrary programs with SYSTEM privileges without proper user verification, allowing local attackers to gain full system control. This affects Acer devices running vulnerable versions of QuickAccess software.

💻 Affected Systems

Products:
  • Acer QuickAccess
Versions: 2.01.300x before 2.01.3030 and 3.00.30xx before 3.00.3038
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Acer devices with QuickAccess software installed. The vulnerability exists in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full SYSTEM privileges, enabling complete system compromise, persistence installation, credential theft, and lateral movement.

🟠

Likely Case

Local user or malware elevates privileges to SYSTEM to bypass security controls, install additional malware, or access protected resources.

🟢

If Mitigated

With proper endpoint protection and least privilege principles, exploitation attempts would be detected and blocked, limiting impact to isolated systems.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: HIGH - Any local user or malware with user-level access can exploit this to gain SYSTEM privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local user access but is straightforward once access is obtained. The named pipe communication mechanism is well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.01.3030 or 3.00.3038 and later

Vendor Advisory: https://community.acer.com/en/kb/articles/14762

Restart Required: Yes

Instructions:

1. Open Acer QuickAccess application. 2. Check for updates in settings. 3. Download and install version 2.01.3030 or 3.00.3038. 4. Restart the system. Alternatively, download from Acer support website and install manually.

🔧 Temporary Workarounds

Disable QuickAccess Service

windows

Stop and disable the vulnerable QuickAccess service to prevent exploitation.

sc stop "QuickAccess Service"
sc config "QuickAccess Service" start= disabled

Remove Named Pipe Permissions

windows

Modify named pipe permissions to restrict access to authorized users only.

icacls "\\.\pipe\QuickAccessPipe" /remove Everyone
icacls "\\.\pipe\QuickAccessPipe" /grant SYSTEM:F

🧯 If You Can't Patch

  • Uninstall Acer QuickAccess software completely from affected systems
  • Implement application whitelisting to block execution of unauthorized programs via the vulnerable service

🔍 How to Verify

Check if Vulnerable:

Check QuickAccess version in Control Panel > Programs and Features. If version is 2.01.300x (before 2.01.3030) or 3.00.30xx (before 3.00.3038), system is vulnerable.

Check Version:

wmic product where "name like 'Acer QuickAccess%'" get version

Verify Fix Applied:

Verify QuickAccess version is 2.01.3030 or higher for v2.x, or 3.00.3038 or higher for v3.x. Check that named pipe \\.\pipe\QuickAccessPipe has restricted permissions.

📡 Detection & Monitoring

Log Indicators:

  • Event logs showing QuickAccess service executing unexpected processes
  • Security logs with privilege escalation events from QuickAccess context

Network Indicators:

  • Local named pipe communication attempts to \\.\pipe\QuickAccessPipe from non-privileged users

SIEM Query:

EventID=4688 AND NewProcessName="*QuickAccess*" AND SubjectUserName!=SYSTEM

🔗 References

📤 Share & Export