7.8
CVSSv3

CVE-2017-3210

Published: 24/07/2018 Updated: 09/10/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Applications developed using the Portrait Display SDK, versions 2.30 up to and including 2.34, default to insecure configurations which allow arbitrary code execution. A number of applications developed using the Portrait Displays SDK do not use secure permissions when running. These applications run the component pdiservice.exe with NT AUTHORITY/SYSTEM permissions. This component is also read/writable by all Authenticated Users. This allows local authenticated malicious users to run arbitrary code with SYSTEM privileges. The following applications have been identified by Portrait Displays as affected: Fujitsu DisplayView Click: Version 6.0 and 6.01. The issue was fixed in Version 6.3. Fujitsu DisplayView Click Suite: Version 5. The issue is addressed by patch in Version 5.9. HP Display Assistant: Version 2.1. The issue was fixed in Version 2.11. HP My Display: Version 2.0. The issue was fixed in Version 2.1. Philips Smart Control Premium: Versions 2.23, 2.25. The issue was fixed in Version 2.26.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

portrait portrait display sdk

fujitsu displayview click 6.0

fujitsu displayview click suite 5.0

fujitsu displayview click 6.01

hp display assistant 2.1

hp my display 2.0

philips smart control premium 2.25

philips smart control premium 2.23

Exploits

Portrait Display SDK Service suffers from a privilege escalation vulnerability due to an insecure service configuration ...