Количество 4
Количество 4
CVE-2024-55414
A vulnerability exits in driver SmSerl64.sys in Motorola SM56 Modem WDM Driver v6.12.23.0, which allows low-privileged users to mapping physical memory via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.
CVE-2024-55414
Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability
GHSA-6prq-q63r-xqhp
A vulnerability exits in driver SmSerl64.sys in Motorola SM56 Modem WDM Driver v6.12.23.0, which allows low-privileged users to mapping physical memory via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.
BDU:2026-00910
Уязвимость драйвера модема Motorola SM56 Modem WDM Driver (SmSerl64.sys) операционной системы Windows, позволяющая нарушителю обойти существующие ограничения безопасности, повысить свои привлегии, выполнить произвольный код и раскрыть защищаемую информацию
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-55414 A vulnerability exits in driver SmSerl64.sys in Motorola SM56 Modem WDM Driver v6.12.23.0, which allows low-privileged users to mapping physical memory via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code. | CVSS3: 9.8 | 0% Низкий | около 1 года назад | |
CVE-2024-55414 Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability | CVSS3: 7.8 | 0% Низкий | 22 дня назад | |
GHSA-6prq-q63r-xqhp A vulnerability exits in driver SmSerl64.sys in Motorola SM56 Modem WDM Driver v6.12.23.0, which allows low-privileged users to mapping physical memory via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code. | CVSS3: 9.8 | 0% Низкий | около 1 года назад | |
BDU:2026-00910 Уязвимость драйвера модема Motorola SM56 Modem WDM Driver (SmSerl64.sys) операционной системы Windows, позволяющая нарушителю обойти существующие ограничения безопасности, повысить свои привлегии, выполнить произвольный код и раскрыть защищаемую информацию | CVSS3: 9.8 | 0% Низкий | около 1 года назад |
Уязвимостей на страницу