// For flags

CVE-2020-36603

 

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

4
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The HoYoVerse (formerly miHoYo) Genshin Impact mhyprot2.sys 1.0.0.0 anti-cheat driver does not adequately restrict unprivileged function calls, allowing local, unprivileged users to execute arbitrary code with SYSTEM privileges on Microsoft Windows systems. The mhyprot2.sys driver must first be installed by a user with administrative privileges.

El controlador anti trampas HoYoVerse (anteriormente miHoYo) Genshin Impact mhyprot2.sys versión 1.0.0.0, no restringe apropiadamente las llamadas a funciones no privilegiadas, lo que permite a usuarios locales no privilegiados ejecutar código arbitrario con privilegios SYSTEM en sistemas Microsoft Windows. El controlador mhyprot2.sys debe ser instalado primero por un usuario con privilegios administrativos

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-09-14 CVE Reserved
  • 2022-09-14 CVE Published
  • 2024-09-11 First Exploit
  • 2024-09-17 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Hoyoverse
Search vendor "Hoyoverse"
Mhyprot2
Search vendor "Hoyoverse" for product "Mhyprot2"
1.0.0.0
Search vendor "Hoyoverse" for product "Mhyprot2" and version "1.0.0.0"
-
Affected