Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally.
How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then trigger an event that could exploit the vulnerability and save an invalid state to a database or trigger other unintended actions. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? Exploitation of the vulnerability requires an attack vector involving both attacker authentication (to modify the DLL) and user interaction (to initiate the Link-to-Phone feature installation and enable the 'Use as a connected camera' option). What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Maturity: Exploit
John Ostrowski with <a href="https://www.compass-security.com/en">Compass Security</a>