CVE-2021-28685
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
AsIO2_64.sys and AsIO2_32.sys in ASUS GPUTweak II before 2.3.0.3 allow low-privileged users to interact directly with physical memory (by calling one of several driver routines that map physical memory into the virtual address space of the calling process) and to interact with MSR registers. This could enable low-privileged users to achieve NT AUTHORITY\SYSTEM privileges via a DeviceIoControl.
Los archivos AsIO2_64.sys y AsIO2_32.sys en ASUS GPUTweak II versiones anteriores a 2.3.0.3, permiten a usuarios pocos privilegiados interactuar directamente con la memoria física (llamando a una de varias rutinas de controlador que mapean la memoria física en el espacio de direcciones virtuales del proceso de llamada) y para interactuar con los registros MSR. Esto podría permitir a usuarios poco privilegiado lograr privilegios NT AUTHORITY\SYSTEM por medio de la función DeviceIoControl
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-03-18 CVE Reserved
- 2021-04-08 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://gist.github.com/DStraghkov/fba4994ac4bb3a6e2940b21743563df0 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.asus.com/Static_WebPage/ASUS-Product-Security-Advisory | 2022-07-12 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Asus Search vendor "Asus" | Gputweak Ii Search vendor "Asus" for product "Gputweak Ii" | < 2.3.0.3 Search vendor "Asus" for product "Gputweak Ii" and version " < 2.3.0.3" | - |
Affected
|