A vulnerability exits in driver snxpsamd.sys in SUNIX Serial Driver x64 - 10.1.0.0, which allows low-privileged users to read and write arbitary i/o port via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Jan 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 | |
Metrics |
cvssV3_1
|
Tue, 07 Jan 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability exits in driver snxpsamd.sys in SUNIX Serial Driver x64 - 10.1.0.0, which allows low-privileged users to read and write arbitary i/o port via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-01-07T00:00:00
Updated: 2025-01-08T15:35:19.177Z
Reserved: 2024-12-06T00:00:00
Link: CVE-2024-55412

Updated: 2025-01-08T15:35:12.497Z

Status : Received
Published: 2025-01-07T18:15:20.700
Modified: 2025-01-08T16:15:35.527
Link: CVE-2024-55412

No data.