Логотип exploitDog
bind:CVE-2021-41285
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-41285

Количество 3

Количество 3

nvd логотип

CVE-2021-41285

больше 4 лет назад

Ballistix MOD Utility through 2.0.2.5 is vulnerable to privilege escalation in the MODAPI.sys driver component. The vulnerability is triggered by sending a specific IOCTL request that allows low-privileged users to directly interact with physical memory via the MmMapIoSpace function call (mapping physical memory into a virtual address space). Attackers could exploit this issue to achieve local privilege escalation to NT AUTHORITY\SYSTEM.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-5h78-qw4w-6wq5

больше 3 лет назад

Ballistix MOD Utility through 2.0.2.5 is vulnerable to privilege escalation in the MODAPI.sys driver component. The vulnerability is triggered by sending a specific IOCTL request that allows low-privileged users to directly interact with physical memory via the MmMapIoSpace function call (mapping physical memory into a virtual address space). Attackers could exploit this issue to achieve local privilege escalation to NT AUTHORITY\SYSTEM.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2024-11108

больше 4 лет назад

Уязвимость функции MmMapIoSpace программного обеспечения контроля системы Ballistix MOD Utility, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-41285

Ballistix MOD Utility through 2.0.2.5 is vulnerable to privilege escalation in the MODAPI.sys driver component. The vulnerability is triggered by sending a specific IOCTL request that allows low-privileged users to directly interact with physical memory via the MmMapIoSpace function call (mapping physical memory into a virtual address space). Attackers could exploit this issue to achieve local privilege escalation to NT AUTHORITY\SYSTEM.

CVSS3: 7.8
0%
Низкий
больше 4 лет назад
github логотип
GHSA-5h78-qw4w-6wq5

Ballistix MOD Utility through 2.0.2.5 is vulnerable to privilege escalation in the MODAPI.sys driver component. The vulnerability is triggered by sending a specific IOCTL request that allows low-privileged users to directly interact with physical memory via the MmMapIoSpace function call (mapping physical memory into a virtual address space). Attackers could exploit this issue to achieve local privilege escalation to NT AUTHORITY\SYSTEM.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2024-11108

Уязвимость функции MmMapIoSpace программного обеспечения контроля системы Ballistix MOD Utility, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу