CVE-2025-14305

7.8 HIGH

📋 TL;DR

CVE-2025-14305 is a local privilege escalation vulnerability in Acer's ListCheck.exe. Authenticated local attackers can replace this executable with malicious code that runs with elevated privileges. This affects systems running vulnerable Acer software.

💻 Affected Systems

Products:
  • Acer ListCheck.exe
Versions: All vulnerable versions prior to patch
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Acer software with ListCheck.exe installed. Exact affected Acer products not specified in references.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise where attackers gain SYSTEM/administrator privileges, install persistent backdoors, access sensitive data, and disable security controls.

🟠

Likely Case

Attackers escalate from standard user to administrator privileges to install malware, steal credentials, or pivot to other systems.

🟢

If Mitigated

Limited impact with proper file permissions, monitoring, and least privilege principles preventing successful exploitation.

🌐 Internet-Facing: LOW - This requires local authenticated access, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Internal attackers with standard user access can exploit this to gain administrative privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated local access and ability to replace the executable file. Simple file replacement attack.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-10581-16346-2.html

Restart Required: Yes

Instructions:

1. Check Acer website for security updates. 2. Apply latest patches for affected Acer software. 3. Restart system after patching. 4. Verify ListCheck.exe is updated.

🔧 Temporary Workarounds

Restrict File Permissions

windows

Set strict ACLs on ListCheck.exe to prevent unauthorized modification

icacls "C:\Path\To\ListCheck.exe" /inheritance:r /grant:r "SYSTEM:(F)" "Administrators:(F)" /deny "Users:(W)"

Remove or Rename Executable

windows

Remove or rename ListCheck.exe if not required for system functionality

ren "C:\Path\To\ListCheck.exe" "ListCheck.exe.bak"

🧯 If You Can't Patch

  • Implement strict file integrity monitoring for ListCheck.exe
  • Apply least privilege principles and restrict standard users from modifying system directories

🔍 How to Verify

Check if Vulnerable:

Check if ListCheck.exe exists in Acer software directories and verify file permissions allow standard users to modify it.

Check Version:

Not specified - check Acer software version through Control Panel or vendor documentation

Verify Fix Applied:

Verify ListCheck.exe has been updated to patched version and file permissions restrict modification to administrators only.

📡 Detection & Monitoring

Log Indicators:

  • File modification events for ListCheck.exe
  • Process creation from unexpected ListCheck.exe locations
  • Unauthorized privilege escalation attempts

Network Indicators:

  • Unusual outbound connections from ListCheck.exe process

SIEM Query:

EventID=4663 OR EventID=4688 | where TargetObject contains "ListCheck.exe" OR NewProcessName contains "ListCheck.exe"

🔗 References

📤 Share & Export