CVE-2023-32163

HIGH

Wacom Driver - Symlink Following

Title source: rule
STIX 2.1

Description

Wacom Drivers for Windows Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Wacom Drivers for Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Tablet Service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-16857.

Exploits (1)

nomisec WRITEUP 2 stars
by LucaBarile · poc
https://github.com/LucaBarile/ZDI-CAN-16857

References (1)

Core 1
Core References
Third Party Advisory, VDB Entry x_research-advisory
https://www.zerodayinitiative.com/advisories/ZDI-23-742

Scores

CVSS v3 7.8
EPSS 0.0008
EPSS Percentile 23.2%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-59
Status published
Products (1)
wacom/driver 6.3.45-1
Published Sep 06, 2023
Tracked Since Feb 18, 2026