ASUS EC Tool driver (aka d.sys) 1beb15c90dcf7a5234ed077833a0a3e900969b60be1d04fcebce0a9f8994bdbb, as signed by ASUS and shipped with multiple ASUS software products, contains multiple IOCTL handlers that provide raw read and write access to port I/O and MSRs via unprivileged IOCTL calls. Local users can gain privileges.
References
Link | Resource |
---|---|
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0003.md | Third Party Advisory |
Configurations
Information
Published : 2023-02-15 13:15
Updated : 2023-02-24 08:01
NVD link : CVE-2022-42455
Mitre link : CVE-2022-42455
JSON object : View
CWE
Products Affected
asus
- armoury_crate