Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pgj3-5w38-pg9m

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

The driver in Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.

The driver in Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.

EPSS

Процентиль: 99%
0.7642
Высокий

7.8 High

CVSS3

Дефекты

CWE-125
CWE-269

Связанные уязвимости

CVSS3: 7.8
nvd
больше 6 лет назад

The driver in Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.

CVSS3: 7.8
fstec
больше 6 лет назад

Уязвимость утилита для мониторинга работы видеокарт Micro-Star MSI Afterburner, связанная с чтением за границами памяти в буфере, позволяющая нарушителю повысить привилегии, выполнить произвольный код с высокими привилегиями и раскрыть защищаемую информацию

EPSS

Процентиль: 99%
0.7642
Высокий

7.8 High

CVSS3

Дефекты

CWE-125
CWE-269