
CVE-2024-12227 – MSI Dragon Center IOCTL NTIOLib_X64.sys MmUnMapIoSpace null pointer dereference
https://notcve.org/view.php?id=CVE-2024-12227
05 Dec 2024 — A vulnerability, which was classified as problematic, was found in MSI Dragon Center up to 2.0.146.0. This affects the function MmUnMapIoSpace in the library NTIOLib_X64.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. Upgrading to version 2.0.148.0 is able to address this issue. • https://shareforall.notion.site/MSI-Dragon-Center-NTIOLib_X64-0xC3506104-MmMapIoSpace-DOS-15160437bb1e801daf58d4aea052970e • CWE-404: Improper Resource Shutdown or Release CWE-476: NULL Pointer Dereference •

CVE-2021-44901
https://notcve.org/view.php?id=CVE-2021-44901
04 Feb 2022 — Micro-Star International (MSI) Dragon Center <= 2.0.116.0 is vulnerable to multiple Privilege Escalation (LPE/EoP) vulnerabilities in the atidgllk.sys, atillk64.sys, MODAPI.sys, NTIOLib.sys, NTIOLib_X64.sys, WinRing0.sys, WinRing0x64.sys drivers components. All the vulnerabilities are triggered by sending specific IOCTL requests. Micro-Star International (MSI) Dragon Center versiones anteriores a 2.0.116.0 incluyéndola, es vulnerable a múltiples vulnerabilidades de escalada de privilegios (LPE/EoP) en los c... • https://voidsec.com •

CVE-2021-29337
https://notcve.org/view.php?id=CVE-2021-29337
21 Jun 2021 — MODAPI.sys in MSI Dragon Center 2.0.104.0 allows low-privileged users to access kernel memory and potentially escalate privileges via a crafted IOCTL 0x9c406104 call. This IOCTL provides the MmMapIoSpace feature for mapping physical memory. Un archivo MODAPI.sys en MSI Dragon Center versión 2.0.104.0, permite a usuarios poco privilegiados acceder a la memoria del kernel y potencialmente escalar privilegios por medio de una llamada IOCTL 0x9c406104 diseñada. Esta IOCTL proporciona la funcionalidad MmMapIoSpa... • https://github.com/rjt-gupta/CVE-2021-29337 •

CVE-2021-27965
https://notcve.org/view.php?id=CVE-2021-27965
05 Mar 2021 — The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 has a buffer overflow that allows privilege escalation via a crafted 0x80102040, 0x80102044, 0x80102050, or 0x80102054 IOCTL request. El controlador MsIo64.sys versiones anteriores a 1.1.19.1016 en MSI Dragon Center versiones anteriores a 2.0.98.0, presenta un desbordamiento del búfer que permite una escalada de privilegios por medio de una petición diseñada de IOCTL 0x80102040, 0x80102044, 0x80102050 o 0x80102054 • https://github.com/mathisvickie/CVE-2021-27965 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2020-13149
https://notcve.org/view.php?id=CVE-2020-13149
18 May 2020 — Weak permissions on the "%PROGRAMDATA%\MSI\Dragon Center" folder in Dragon Center before 2.6.2003.2401, shipped with Micro-Star MSI Gaming laptops, allows local authenticated users to overwrite system files and gain escalated privileges. One attack method is to change the Recommended App binary within App.json. Another attack method is to use this part of %PROGRAMDATA% for mounting an RPC Control directory. Los permisos débiles en la carpeta "%PROGRAMDATA%\MSI\Dragon Center" en Dragon Center en versiones an... • https://github.com/rishaldwivedi/Public_Disclosure/blob/master/README.md#msi-dragon-center-eop • CWE-276: Incorrect Default Permissions •