CVE-2022-41114 – Windows Bind Filter Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2022-41114
Windows Bind Filter Driver Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios de Windows Bind Filter Driver • https://github.com/gmh5225/CVE-2022-41114 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41114 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2021-42205
https://notcve.org/view.php?id=CVE-2021-42205
ELAN Miniport touchpad Windows driver before 24.21.51.2, as used in PC hardware from multiple manufacturers, allows local users to cause a system crash by sending a certain IOCTL request, because that request is handled twice. El controlador de Windows del panel táctil ELAN Miniport anterior a 24.21.51.2, tal como se usa en hardware de PC de varios fabricantes, permite a los usuarios locales provocar una falla del sistema enviando una determinada solicitud IOCTL, porque esa solicitud se maneja dos veces. • https://github.com/gmh5225/CVE-2021-42205 https://www.emc.com.tw/upload/F2E/Vulnerability%20Report/Vulnerability%20Report_Miniport%20touchpad%20Windows%20driver_20221107.pdf •
CVE-2020-36603
https://notcve.org/view.php?id=CVE-2020-36603
The HoYoVerse (formerly miHoYo) Genshin Impact mhyprot2.sys 1.0.0.0 anti-cheat driver does not adequately restrict unprivileged function calls, allowing local, unprivileged users to execute arbitrary code with SYSTEM privileges on Microsoft Windows systems. The mhyprot2.sys driver must first be installed by a user with administrative privileges. El controlador anti trampas HoYoVerse (anteriormente miHoYo) Genshin Impact mhyprot2.sys versión 1.0.0.0, no restringe apropiadamente las llamadas a funciones no privilegiadas, lo que permite a usuarios locales no privilegiados ejecutar código arbitrario con privilegios SYSTEM en sistemas Microsoft Windows. • https://github.com/gmh5225/CVE-2020-36603 https://github.com/kagurazakasanae/Mhyprot2DrvControl https://github.com/kkent030315/evil-mhyprot-cli https://web.archive.org/web/20211204031301/https://www.godeye.club/2021/05/20/001-disclosure-mhyprot.html https://www.trendmicro.com/en_us/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html https://www.vice.com/en/article/y3p35w/hackers-are-using-anti-cheat-in-genshin-impact-to-ransom-victims •
CVE-2022-37969 – Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2022-37969
Windows Common Log File System Driver Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Windows Common Log File System Driver. Este ID de CVE es diferente de CVE-2022-35803 Microsoft Windows Common Log File System (CLFS) driver contains an unspecified vulnerability that allows for privilege escalation. • https://github.com/fortra/CVE-2022-37969 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37969 • CWE-787: Out-of-bounds Write •
CVE-2022-24494 – Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2022-24494
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Windows Ancillary Function Driver for WinSock • https://github.com/vportal/AFD https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24494 •