5 results (0.006 seconds)

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

10 Apr 2025 — MSI Center before 2.0.52.0 has Missing PE Signature Validation. • https://csr.msi.com/global/product-security-advisories • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

10 Apr 2025 — MSI Center before 2.0.52.0 allows TOCTOU Local Privilege Escalation. • https://csr.msi.com/global/product-security-advisories • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 1

28 Nov 2022 — An issue in the component MSI.TerminalServer.exe of MSI Center v1.0.41.0 allows attackers to escalate privileges via a crafted TCP packet. Un problema en el componente MSI.TerminalServer.exe de MSI Center v1.0.41.0 permite a los atacantes escalar privilegios a través de un paquete TCP manipulado. • http://msi.com • CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 1

19 Sep 2022 — Micro-Star International Co., Ltd MSI Center 1.0.50.0 was discovered to contain a vulnerability in the component C_Features of MSI.CentralServer.exe. This vulnerability allows attackers to escalate privileges via running a crafted executable. Se ha detectado que MSI Center versión 1.0.50.0 de Micro-Star International Co., Ltd, contiene una vulnerabilidad en el componente C_Features del archivo MSI.CentralServer.exe. Esta vulnerabilidad permite a atacantes escalar privilegios por medio del funcionamiento de ... • https://github.com/nam3lum/msi-central_privesc •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

04 Feb 2022 — Micro-Star International (MSI) Center <= 1.0.31.0 is vulnerable to multiple Privilege Escalation vulnerabilities in the atidgllk.sys, atillk64.sys, MODAPI.sys, NTIOLib.sys, NTIOLib_X64.sys, WinRing0.sys, WinRing0x64.sys drivers components. All the vulnerabilities are triggered by sending specific IOCTL requests. Micro-Star International (MSI) Center versiones anteriores a 1.0.31.0 incluyéndola, es vulnerable a múltiples vulnerabilidades de escalada de privilegios en los componentes de los controladores atid... • https://voidsec.com •