Home
1
Hot News
2
Information Security
3
[TWCERT 分享資安情資] Acer ControlCenter - Remote Code Execution4
https://www.kjintelligent.com/en/ KJ Intelligent Corp.
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要          Synology 存在漏洞,遠端攻擊者可利用此漏洞,於目標系統觸發遠端執行任意程式碼。二、存在風險     Synology 產品存在漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發遠端執行任意程式碼,其影響系統或版本如下:BeeStation OS 1.3BeeStation OS 1.2BeeStation OS 1.1BeeStation OS 1.0三、建議改善措施:    請將BeeStation OS更新至1.3.2-65648或更高版本。        情資報告連結:https://www.synology.com/en-global/security/advisory/Synology_SA_25_12 https://www.kjintelligent.com/en/hot_525872.html [Cybersecurity Vulnerability Notice]_Synology 零日遠端執行程式碼漏洞 2025-11-20 2026-11-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_525872.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_525872.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2025-11-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_525872.html


【出處:台灣電腦緊急應變小組 TWCert】
【Acer ControlCenter - Remote Code Execution】(CVE-2025-5491,CVSS:8.8)
Ace
r ControlCenter 存在Remote Code Execution漏洞。該程式透過自訂的 Windows Named Pipe 對外
提供功能。然而該 Named Pipe 配置不當,使得具備低權限之遠端使用者也能與其互動並存取相關功
能。其中一項功能允許以 NT AUTHORITY/SYSTEM 身分執行任意程式,攻擊者可藉此在目標系統上以
高權限執行任意程式碼。
◎建議措施:
更新至4.00.3058(含)以後版本
◎相關IOC資訊:
◎備註:
◎參考資料:
1. https://www.twcert.org.tw/tw/cp-132-10180-36818-1.html

Previous Back to List Next