CVE-2023-32162
📋 TL;DR
This vulnerability allows local attackers with low-privileged access to escalate to SYSTEM privileges by exploiting incorrect file permissions on WacomInstallI.txt. It affects Windows systems with vulnerable Wacom driver installations. Attackers must already have code execution on the target system to exploit this flaw.
💻 Affected Systems
- Wacom Drivers for Windows
📦 What is this software?
Driver by Wacom
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with SYSTEM-level code execution, allowing attackers to install malware, steal credentials, disable security controls, and maintain persistent access.
Likely Case
Local privilege escalation from standard user to SYSTEM, enabling installation of additional malware, credential dumping, and lateral movement within the network.
If Mitigated
Limited impact if proper endpoint protection, least privilege principles, and application control are implemented to prevent unauthorized code execution.
🎯 Exploit Status
Exploitation requires local code execution first, then leveraging file permission issues. The vulnerability is well-documented and relatively simple to exploit once initial access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in CVE, but Wacom has released updated drivers
Vendor Advisory: https://www.wacom.com/en-us/support/product-support/drivers
Restart Required: Yes
Instructions:
1. Visit Wacom driver download page. 2. Download latest driver version. 3. Uninstall current Wacom driver. 4. Install updated driver. 5. Restart system.
🔧 Temporary Workarounds
Remove vulnerable file permissions
windowsModify permissions on WacomInstallI.txt to prevent unauthorized write access
icacls "C:\Program Files\Wacom\WacomInstallI.txt" /inheritance:r
icacls "C:\Program Files\Wacom\WacomInstallI.txt" /grant SYSTEM:F
icacls "C:\Program Files\Wacom\WacomInstallI.txt" /grant Administrators:F
Remove Wacom drivers if not needed
windowsUninstall Wacom drivers from systems where they are not required
appwiz.cpl
Select Wacom Tablet Software and click Uninstall
🧯 If You Can't Patch
- Implement application control to prevent execution of PrefUtil.exe by non-administrative users
- Use endpoint detection and response (EDR) to monitor for privilege escalation attempts and file permission changes
🔍 How to Verify
Check if Vulnerable:
Check if Wacom drivers are installed and examine permissions on WacomInstallI.txt file: icacls "C:\Program Files\Wacom\WacomInstallI.txt"
Check Version:
wmic product where "name like '%Wacom%'" get version
Verify Fix Applied:
Verify updated driver version is installed and file permissions are restricted: driver version should be latest, and file should have proper ACLs
📡 Detection & Monitoring
Log Indicators:
- Windows Security Event ID 4688 for PrefUtil.exe execution with unusual parameters
- File permission changes on WacomInstallI.txt
- Process creation from low-privileged user to SYSTEM context
Network Indicators:
- No direct network indicators as this is local exploitation
SIEM Query:
EventID=4688 AND (ProcessName="PrefUtil.exe" OR CommandLine LIKE "%WacomInstallI.txt%")