An issue in Inspect Element Ltd Echo.ac v.5.2.1.0 allows a local attacker to gain privileges via a crafted command to the echo_driver.sys component. NOTE: the vendor's position is that the reported ability for user-mode applications to execute code as NT AUTHORITY\SYSTEM was "deactivated by Microsoft itself."
- https://ioctl.fail/echo-ac-writeup/
- https://github.com/Whanos/Whanos
- https://github.com/hfiref0x/KDU
- https://github.com/kite03/echoac-poc
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/pseuxide/kur
- https://github.com/vxcall/kur