A vulnerability exits in driver snxpsamd.sys in SUNIX Serial Driver x64 - 10.1.0.0, which allows low-privileged users to read and write arbitary i/o port via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.
References
Configurations
No configuration.
History
08 Jan 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
07 Jan 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-07 18:15
Updated : 2025-01-08 16:15
NVD link : CVE-2024-55412
Mitre link : CVE-2024-55412
CVE.ORG link : CVE-2024-55412
JSON object : View
Products Affected
No product.
CWE
CWE-787
Out-of-bounds Write