CVE-2021-44901
https://notcve.org/view.php?id=CVE-2021-44901
Micro-Star International (MSI) Dragon Center <= 2.0.116.0 is vulnerable to multiple Privilege Escalation (LPE/EoP) vulnerabilities in the atidgllk.sys, atillk64.sys, MODAPI.sys, NTIOLib.sys, NTIOLib_X64.sys, WinRing0.sys, WinRing0x64.sys drivers components. All the vulnerabilities are triggered by sending specific IOCTL requests. Micro-Star International (MSI) Dragon Center versiones anteriores a 2.0.116.0 incluyéndola, es vulnerable a múltiples vulnerabilidades de escalada de privilegios (LPE/EoP) en los componentes de los controladores atidgllk.sys, atillk64.sys, MODAPI.sys, NTIOLib.sys, NTIOLib_X64.sys, WinRing0.sys, WinRing0x64.sys. Todas las vulnerabilidades son desencadenadas mediante el envío de peticiones IOCTL específicas • https://voidsec.com https://voidsec.com/advisories/cve-2021-44901 •
CVE-2021-27965
https://notcve.org/view.php?id=CVE-2021-27965
The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 has a buffer overflow that allows privilege escalation via a crafted 0x80102040, 0x80102044, 0x80102050, or 0x80102054 IOCTL request. El controlador MsIo64.sys versiones anteriores a 1.1.19.1016 en MSI Dragon Center versiones anteriores a 2.0.98.0, presenta un desbordamiento del búfer que permite una escalada de privilegios por medio de una petición diseñada de IOCTL 0x80102040, 0x80102044, 0x80102050 o 0x80102054 • https://github.com/mathisvickie/CVE-2021-27965 https://github.com/Jeromeyoung/CVE-2021-27965 https://github.com/fengjixuchui/CVE-2021-27965 https://github.com/kronl/cve/tree/master/MSI_Dragon_Center https://www.microsoft.com/en-us/p/msi-dragon-center/9nh7n2bv1cqq?activetab=pivot:overviewtab • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2020-13149
https://notcve.org/view.php?id=CVE-2020-13149
Weak permissions on the "%PROGRAMDATA%\MSI\Dragon Center" folder in Dragon Center before 2.6.2003.2401, shipped with Micro-Star MSI Gaming laptops, allows local authenticated users to overwrite system files and gain escalated privileges. One attack method is to change the Recommended App binary within App.json. Another attack method is to use this part of %PROGRAMDATA% for mounting an RPC Control directory. Los permisos débiles en la carpeta "%PROGRAMDATA%\MSI\Dragon Center" en Dragon Center en versiones anteriores a la 2.6.2003.2401, entregada con las computadoras portátiles Micro-Star MSI Gaming, permiten a usuarios autenticados locales sobrescribir los archivos de sistema y alcanzar privilegios escalados. Un método de ataque es cambiar el binario Recommended App dentro de App.json. • https://github.com/rishaldwivedi/Public_Disclosure/blob/master/README.md#msi-dragon-center-eop • CWE-276: Incorrect Default Permissions •