CVE-2021-41285
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Ballistix MOD Utility through 2.0.2.5 is vulnerable to privilege escalation in the MODAPI.sys driver component. The vulnerability is triggered by sending a specific IOCTL request that allows low-privileged users to directly interact with physical memory via the MmMapIoSpace function call (mapping physical memory into a virtual address space). Attackers could exploit this issue to achieve local privilege escalation to NT AUTHORITY\SYSTEM.
Ballistix MOD Utility versiones hasta 2.0.2.5, es vulnerable a una escalada de privilegios en el componente del controlador MODAPI.sys. La vulnerabilidad es desencadenada al enviar una petición IOCTL específica que permite a usuarios con pocos privilegios interactuar directamente con la memoria física por medio de la llamada a la función MmMapIoSpace (mapeo de la memoria física en un espacio de direcciones virtual). Unos atacantes podrían explotar este problema para lograr una escalada de privilegios local a NT AUTHORITY\SYSTEM
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-09-15 CVE Reserved
- 2021-10-04 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Micron Search vendor "Micron" | Ballistix Memory Overview Display Utility Search vendor "Micron" for product "Ballistix Memory Overview Display Utility" | <= 2.0.2.5 Search vendor "Micron" for product "Ballistix Memory Overview Display Utility" and version " <= 2.0.2.5" | - |
Affected
|